A guide to basic digital hygiene. This guide is a collection of the most basic digital hygiene tips, starting with the most basic to a bit more niche. (2025)
The app is a major source of raw location data for a multibillion-dollar industry that buys, packages, and sells people’s movements (2024)
The pathway to more widespread web3 adoption starts with familiar web2 onboarding user journeys before branching out further with with non-custodia... (2022)
Open source security scanning platform Snyk, used by developers at companies such as Google and Salesforce, has raised $300 million. The problem... (2021)
A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware... (2021)
Apple Inc (AAPL.O) on Monday said that iPhone users' entire photo libraries will be checked for known child abuse images if they are stored in the ... (2021)
While it’s possible to understand Apple’s motivations behind its decision to enable on-device scanning, the company had a better way to satisfy its... (2021)
When acting Danish finance minister Morten Bødskov announced last week that Denmark would soon launch a digital “corona passport,” the news spread ... (2021)
Civil liberties groups have criticized the use of these dragnet search warrants. The search warrant compelled Google to provide police with the ... (2021)
How to reduce tracking, block ads, and encrypt all the things. (2021)
With end-to-end encryption, disappearing messages, and no data collection, there's a lot to love about this privacy-oriented messaging app. (2021)
Democrats blast FTC/Zoom settlement because users won't get compensation. (2020)
The House and Senate are both pushing forward with the so-called “EARN IT” Act, a bill that will undermine encryption and free speech online. Attor... (2020)
The Ninth Circuit Court of Appeals has ruled that LinkedIn can’t deny an analytics company access to publicly accessible information under the anti... (2019)
Whenever you surf the web, and login to a website, you do it only once, when you visit the website afterwards, you are already logged in. How does ... (2020)
The Center for Internet and Society at Stanford Law School is a leader in the study of the law and policy around the Internet and other emerging te... (2020)
The two flaws can be used to spy on a Zoom user's webcam and microphone. (2020)
An Avast antivirus subsidiary sells 'Every search. Every click. Every buy. On every site.' Its clients have included Home Depot, Google, Microsoft,... (2020)
Apple Inc dropped plans to let iPhone users fully encrypt backups of their devices in the company's iCloud service after the FBI complained that th... (2020)
1Password has been around for 14 years, and the founders grew the company the old-fashioned way — without a dime of venture capital. But when it de... (2019)
Ad trackers are out of control. Use a browser that reins them in. "There's a new battleground in the browser wars: user privacy. Firefox just ma... (2019)
Apple shared plenty of news today at its WWDC 2019 annual developer conference, but a few of the announcements early on are potentially its biggest... (2019)
USB charging stations at airports can actually be dangerous, as cybercriminals often use them to install malware on your device or transmit unwante... (2019)
Scientific American is the essential guide to the most awe-inspiring advances in science and technology, explaining how they change our understandi... (2019)
A VPN is a tunnel connecting two different networks. You throw traffic into one end of the tunnel, and it will come out somewhere else, even if the... (2019)
The answer to this question is still "Yes!" Here I demonstrate yet another way for the server to access your data, the issues being structural. (2019)
You know how kings used to have trumpeters heralding their arrival wherever they went? Proxy wants to do that with Bluetooth. The startup lets you ... (2019)
RailsGoat is a vulnerable version of the Ruby on Rails Framework from versions 3 to 5. It includes vulnerabilities from the OWASP Top 10, as well a... (2019)
There are strong parallels between organised abuse of Facebook and FB’s attempts to respond, in the last 24 months, and malware on Windows and Offi... (2019)
The system will be fully open source and designed with newly developed secure hardware to make the system not only impervious to certain kinds of h... (2019)
A quantum computer in the next decade could crack the encryption our society relies on using Shor's Algorithm. (2023)
Quantum Computers, explained with MKBHD Quantum computers aren’t what you've been told. (2023)
VICE News Published on Mar 14, 2018 U.S. intelligence agencies accuse Russia of hacking the 2016 presidential election, a Ben Ferguson travels ... (2018)
Join Jonathan Reichental for an in-depth discussion in this video, Risk and security challenges with using the Internet today, part of Blockchain B... (2018)
LastWeekTonight, 2017: "John Oliver discusses the massive impact of the cybersecurity breach at Equifax and their massively misguided attempts to m... (2017)
Listen to this episode from a16z Podcast on Spotify. Today’s episode is all about crypto security — that is, the new mindsets and the new strategie... (2021)
Given concern around data breaches, the EU Parliament finally passed GDPR (General Data Protection Regulation) after four years of preparation and ... (2018)
The best VPN service for private browsing, fast streaming, and more. Download our free VPN now — or check out Proton VPN Plus for even more premium... (2025)
Surfshark VPN – protect your data online ● Unlimited devices ● 24/7 support ● 3200+ servers in 100 countries ● No-logs policy ● RAM-only servers, a... (2023)
Simplify the security assessment process with hosted vulnerability scanners. Online Vulnerability Scanners to map the attack surface and identify ... (2019)
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of dat... (2019)