Back to Categories

CYBER SECURITY

Category

Chunks within this category

VPN - virtual private networks and Encryption and Cybersecurity

VPN - virtual private networks and Encryption and Cybersecurity

Quantum Computing - and issues with encryption, cybersecurity

Quantum Computing - and issues with encryption, cybersecurity

ATT: Apple’s App Tracking Transparency - Data and Social Media, Facebook: Privacy, Security

ATT: Apple’s App Tracking Transparency - Data and Social Media, Facebook: Privacy, Security

Mozilla Firefox - Internet Browser

Mozilla Firefox - Internet Browser

Custody issues - Cryptocurrency Wallets - Storing Crypto assets, Bitcoin, other tokens

Custody issues - Cryptocurrency Wallets - Storing Crypto assets, Bitcoin, other tokens

Life360 - privacy issues and location-tracking app for parents, kids

Life360 - privacy issues and location-tracking app for parents, kids

Ring from Amazon - Smart homes and the Internet of Things IoT

A collection of articles and videos about Smart homes and the Internet of Things (IoT)

Vaccine Passports - Travel, Testing, Privacy issues and COVID19 - Coronavirus

Vaccine Passports - Travel, Testing, Privacy issues and COVID19 - Coronavirus

Public WiFi hotspots - getting access to the internet while traveling - security issues

Public WiFi hotspots - getting access to the internet while traveling - security issues

Telegram and blockchain tokens

Telegram and blockchain tokens

Encryption, Cybersecurity and Legal Issues, Law Enforcement

Encryption, Cybersecurity and Legal Issues, Law Enforcement

Signal - messaging app

Signal - messaging app

Remote working and Surveillance, Security, Privacy Issues

Remote working and Surveillance, Security, Privacy Issues

School safety - gun violence, police in K12 education

a collection of articles looking at how technology is being used to enhance Elementary and Presch...

Data, privacy and surveillance issues - examples of companies selling your data

a collection of articles, videos and resources examining issues related to Data, privacy and surv...

Passwords and Encryption, Cybersecurity

a look at encryption, and it's importance in computer science and cyber security (privacy, etc)

FEARS: Peer to peer ratings, social media, Surveillance, Security and Privacy Issues

a collection of articles and videos about Surveillance and Privacy

Resources within this category

Article

Life360 Is Selling Precise Location Data on Its Tens of Millions of Users – The Markup

The app is a major source of raw location data for a multibillion-dollar industry that buys, packages, and sells people’s movements (2024)


Article

The Missing Link Between Web2 and Web3: Custody | Future

The pathway to more widespread web3 adoption starts with familiar web2 onboarding user journeys before branching out further with with non-custodia... (2022)


Article

Open source security scanning platform Snyk raises $300M | VentureBeat

Open source security scanning platform Snyk, used by developers at companies such as Google and Salesforce, has raised $300 million. The problem... (2021)


Article

What is Pegasus? A cybersecurity expert explains how the spyware invades phones and what it does when it gets in

A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware... (2021)


Article

Apple says photos in iCloud will be checked by child abuse detection system | Reuters

Apple Inc (AAPL.O) on Monday said that iPhone users' entire photo libraries will be checked for known child abuse images if they are stored in the ... (2021)


Article

Apple’s Mistake – Stratechery by Ben Thompson

While it’s possible to understand Apple’s motivations behind its decision to enable on-device scanning, the company had a better way to satisfy its... (2021)


Article

Why Denmark’s “corona passport” is more of a promise than a plan | MIT Technology Review

When acting Danish finance minister Morten Bødskov announced last week that Denmark would soon launch a digital “corona passport,” the news spread ... (2021)


Article

Minneapolis police tapped Google to identify George Floyd protesters – TechCrunch

Civil liberties groups have criticized the use of these dragnet search warrants. The search warrant compelled Google to provide police with the ... (2021)


Article

These 6 browser extensions will protect your privacy online

How to reduce tracking, block ads, and encrypt all the things. (2021)


Article

What is Signal? The basics of the most secure messaging app.

With end-to-end encryption, disappearing messages, and no data collection, there's a lot to love about this privacy-oriented messaging app. (2021)


Article

Zoom lied to users about end-to-end encryption for years, FTC says

Democrats blast FTC/Zoom settlement because users won't get compensation. (2020)


Article

Stop the EARN IT Bill Before It Breaks Encryption | EFF Action Center

The House and Senate are both pushing forward with the so-called “EARN IT” Act, a bill that will undermine encryption and free speech online. Attor... (2020)


Article

Scraping public data from a website probably isn’t hacking, says court

The Ninth Circuit Court of Appeals has ruled that LinkedIn can’t deny an analytics company access to publicly accessible information under the anti... (2019)


Article

Everything You Need to Know About Cookies for Web Development

Whenever you surf the web, and login to a website, you do it only once, when you visit the website afterwards, you are already logged in. How does ... (2020)


Article

An Even Worse Anti-Encryption Bill Than EARN IT - Stanford Law School

The Center for Internet and Society at Stanford Law School is a leader in the study of the law and policy around the Internet and other emerging te... (2020)


Article

Ex-NSA hacker drops new zero-day doom for Zoom

The two flaws can be used to spy on a Zoom user's webcam and microphone. (2020)


Article

Leaked Documents Expose the Secretive Market for Your Web Browsing Data - VICE

An Avast antivirus subsidiary sells 'Every search. Every click. Every buy. On every site.' Its clients have included Home Depot, Google, Microsoft,... (2020)


Article

Exclusive: Apple dropped plan for encrypting backups after FBI complained - sources - Reuters

Apple Inc dropped plans to let iPhone users fully encrypt backups of their devices in the company's iCloud service after the FBI complained that th... (2020)


Article

Fourteen years after launching, 1Password takes a $200M Series A – TechCrunch

1Password has been around for 14 years, and the founders grew the company the old-fashioned way — without a dime of venture capital. But when it de... (2019)


Article

It's Time to Switch to a Privacy Browser | WIRED 2019

Ad trackers are out of control. Use a browser that reins them in. "There's a new battleground in the browser wars: user privacy. Firefox just ma... (2019)


Article

Apple is now the privacy-as-a-service company – 2019 - TechCrunch

Apple shared plenty of news today at its WWDC 2019 annual developer conference, but a few of the announcements early on are potentially its biggest... (2019)


Article

The Mathematics of (Hacking) Passwords - Scientific American

Scientific American is the essential guide to the most awe-inspiring advances in science and technology, explaining how they change our understandi... (2019)


Article

VPN - a Very Precarious Narrative - Dennis Schubert

A VPN is a tunnel connecting two different networks. You throw traffic into one end of the tunnel, and it will come out somewhere else, even if the... (2019)


Article

Should you be concerned about LastPass uploading your passwords to its server?

The answer to this question is still "Yes!" Here I demonstrate yet another way for the server to access your data, the issues being structural. (2019)


Article

Proxy raises $13.6M to unlock anything with Bluetooth identity – TechCrunch

You know how kings used to have trumpeters heralding their arrival wherever they went? Proxy wants to do that with Bluetooth. The startup lets you ... (2019)


Article

Rails GOAT - github - A vulnerable version of Rails that follows the OWASP Top 10

RailsGoat is a vulnerable version of the Ruby on Rails Framework from versions 3 to 5. It includes vulnerabilities from the OWASP Top 10, as well a... (2019)


Article

Microsoft, Facebook, trust and privacy — 2019 - Benedict Evans

There are strong parallels between organised abuse of Facebook and FB’s attempts to respond, in the last 24 months, and malware on Windows and Offi... (2019)


Article

DARPA Is Building a $10 Million, Open Source, Secure Voting System - Motherboard - Vice

The system will be fully open source and designed with newly developed secure hardware to make the system not only impervious to certain kinds of h... (2019)


Article

Once hailed as unhackable, blockchains are now getting hacked - MIT Technology Review

More and more security holes are appearing in cryptocurrency and smart contract platforms, and some are fundamental to the way they were built. (2019)


Article

Why can’t a bot tick the 'I'm not a robot' box? - Quora

For starters, Google invented an entire virtual machine – essentially a simulated computer inside a computer – just to run that checkbox... Goog... (2019)


Video

How Quantum Computers Break The Internet... Starting Now

A quantum computer in the next decade could crack the encryption our society relies on using Shor's Algorithm. (2023)


Video

Quantum Computers, explained with MKBHD

Quantum Computers, explained with MKBHD Quantum computers aren’t what you've been told. (2023)


Video

Risk and security challenges with using the Internet today: Blockchain | LinkedIn Learning (video)

Join Jonathan Reichental for an in-depth discussion in this video, Risk and security challenges with using the Internet today, part of Blockchain B... (2018)


Video

Equifax: Last Week Tonight with John Oliver (HBO)

LastWeekTonight, 2017: "John Oliver discusses the massive impact of the cybersecurity breach at Equifax and their massively misguided attempts to m... (2017)


Podcast

Crypto Security and the New Web3 Mindsets for Users - a16z Podcast | Podcast on Spotify

Listen to this episode from a16z Podcast on Spotify. Today’s episode is all about crypto security — that is, the new mindsets and the new strategie... (2021)


Podcast

What to Know about GDPR – a16z Podcast: Andreessen Horowitz

Given concern around data breaches, the EU Parliament finally passed GDPR (General Data Protection Regulation) after four years of preparation and ... (2018)


Website

Proton VPN: Secure, fast VPN service in 110+ countries

The best VPN service for private browsing, fast streaming, and more. Download our free VPN now — or check out Proton VPN Plus for even more premium... (2025)


Website

Surfshark: secure online VPN service & more

Surfshark VPN – protect your data online ● Unlimited devices ● 24/7 support ● 3200+ servers in 100 countries ● No-logs policy ● RAM-only servers, a... (2023)


Website

 Hacker Target. com

Simplify the security assessment process with hosted vulnerability scanners. Online Vulnerability Scanners to map the attack surface and identify ... (2019)


Website

SQLmap: automatic SQL injection and database takeover tool

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of dat... (2019)


Content Stats

103 Articles
4 Videos
2 Podcasts
1 Notes
4 Websites
46 Chunks