VPN - virtual private networks and Encryption and Cybersecurity
Quantum Computing - and issues with encryption, cybersecurity
ATT: Apple’s App Tracking Transparency - Data and Social Media, Facebook: Privacy, Security
Mozilla Firefox - Internet Browser
Custody issues - Cryptocurrency Wallets - Storing Crypto assets, Bitcoin, other tokens
Life360 - privacy issues and location-tracking app for parents, kids
A collection of articles and videos about Smart homes and the Internet of Things (IoT)
Vaccine Passports - Travel, Testing, Privacy issues and COVID19 - Coronavirus
Public WiFi hotspots - getting access to the internet while traveling - security issues
Telegram and blockchain tokens
Encryption, Cybersecurity and Legal Issues, Law Enforcement
Signal - messaging app
Remote working and Surveillance, Security, Privacy Issues
a collection of articles looking at how technology is being used to enhance Elementary and Presch...
a collection of articles, videos and resources examining issues related to Data, privacy and surv...
a look at encryption, and it's importance in computer science and cyber security (privacy, etc)
a collection of articles and videos about Surveillance and Privacy
The app is a major source of raw location data for a multibillion-dollar industry that buys, packages, and sells people’s movements (2024)
The pathway to more widespread web3 adoption starts with familiar web2 onboarding user journeys before branching out further with with non-custodia... (2022)
Open source security scanning platform Snyk, used by developers at companies such as Google and Salesforce, has raised $300 million. The problem... (2021)
A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware... (2021)
Apple Inc (AAPL.O) on Monday said that iPhone users' entire photo libraries will be checked for known child abuse images if they are stored in the ... (2021)
While it’s possible to understand Apple’s motivations behind its decision to enable on-device scanning, the company had a better way to satisfy its... (2021)
When acting Danish finance minister Morten Bødskov announced last week that Denmark would soon launch a digital “corona passport,” the news spread ... (2021)
Civil liberties groups have criticized the use of these dragnet search warrants. The search warrant compelled Google to provide police with the ... (2021)
How to reduce tracking, block ads, and encrypt all the things. (2021)
With end-to-end encryption, disappearing messages, and no data collection, there's a lot to love about this privacy-oriented messaging app. (2021)
Democrats blast FTC/Zoom settlement because users won't get compensation. (2020)
The House and Senate are both pushing forward with the so-called “EARN IT” Act, a bill that will undermine encryption and free speech online. Attor... (2020)
The Ninth Circuit Court of Appeals has ruled that LinkedIn can’t deny an analytics company access to publicly accessible information under the anti... (2019)
Whenever you surf the web, and login to a website, you do it only once, when you visit the website afterwards, you are already logged in. How does ... (2020)
The Center for Internet and Society at Stanford Law School is a leader in the study of the law and policy around the Internet and other emerging te... (2020)
The two flaws can be used to spy on a Zoom user's webcam and microphone. (2020)
An Avast antivirus subsidiary sells 'Every search. Every click. Every buy. On every site.' Its clients have included Home Depot, Google, Microsoft,... (2020)
Apple Inc dropped plans to let iPhone users fully encrypt backups of their devices in the company's iCloud service after the FBI complained that th... (2020)
1Password has been around for 14 years, and the founders grew the company the old-fashioned way — without a dime of venture capital. But when it de... (2019)
Ad trackers are out of control. Use a browser that reins them in. "There's a new battleground in the browser wars: user privacy. Firefox just ma... (2019)
Apple shared plenty of news today at its WWDC 2019 annual developer conference, but a few of the announcements early on are potentially its biggest... (2019)
Scientific American is the essential guide to the most awe-inspiring advances in science and technology, explaining how they change our understandi... (2019)
A VPN is a tunnel connecting two different networks. You throw traffic into one end of the tunnel, and it will come out somewhere else, even if the... (2019)
The answer to this question is still "Yes!" Here I demonstrate yet another way for the server to access your data, the issues being structural. (2019)
You know how kings used to have trumpeters heralding their arrival wherever they went? Proxy wants to do that with Bluetooth. The startup lets you ... (2019)
RailsGoat is a vulnerable version of the Ruby on Rails Framework from versions 3 to 5. It includes vulnerabilities from the OWASP Top 10, as well a... (2019)
There are strong parallels between organised abuse of Facebook and FB’s attempts to respond, in the last 24 months, and malware on Windows and Offi... (2019)
The system will be fully open source and designed with newly developed secure hardware to make the system not only impervious to certain kinds of h... (2019)
More and more security holes are appearing in cryptocurrency and smart contract platforms, and some are fundamental to the way they were built. (2019)
For starters, Google invented an entire virtual machine – essentially a simulated computer inside a computer – just to run that checkbox... Goog... (2019)
A quantum computer in the next decade could crack the encryption our society relies on using Shor's Algorithm. (2023)
Quantum Computers, explained with MKBHD Quantum computers aren’t what you've been told. (2023)
Join Jonathan Reichental for an in-depth discussion in this video, Risk and security challenges with using the Internet today, part of Blockchain B... (2018)
LastWeekTonight, 2017: "John Oliver discusses the massive impact of the cybersecurity breach at Equifax and their massively misguided attempts to m... (2017)
Listen to this episode from a16z Podcast on Spotify. Today’s episode is all about crypto security — that is, the new mindsets and the new strategie... (2021)
Given concern around data breaches, the EU Parliament finally passed GDPR (General Data Protection Regulation) after four years of preparation and ... (2018)
The best VPN service for private browsing, fast streaming, and more. Download our free VPN now — or check out Proton VPN Plus for even more premium... (2025)
Surfshark VPN – protect your data online ● Unlimited devices ● 24/7 support ● 3200+ servers in 100 countries ● No-logs policy ● RAM-only servers, a... (2023)
Simplify the security assessment process with hosted vulnerability scanners. Online Vulnerability Scanners to map the attack surface and identify ... (2019)
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of dat... (2019)