Search for content with this keyword
The House and Senate are both pushing forward with the so-called “EARN IT” Act, a bill that will undermine encryption and free speech online. Attor... (2020)
USB charging stations at airports can actually be dangerous, as cybercriminals often use them to install malware on your device or transmit unwante... (2019)
There are strong parallels between organised abuse of Facebook and FB’s attempts to respond, in the last 24 months, and malware on Windows and Offi... (2019)
Getting a “throwaway” email for online booking is one tip experts offer. Another: Consider signing up for a credit card only for online purchases. (2019)
Cobo, the crypto wallet created by F2Pool's founder, has raised $13 million from NEO and DHVC to expand its staking pool with a cold wallet launch. (2018)
A highly anticipated technology designed to make blockchain privacy features more scalable will be tested on Monero soon. (2018)
Blockchain security startup BitGo is gearing up to safeguard once-unthinkable sums of digital assets as it looks towards a tokenized future. (2018)
Digital identity is scattered and insecure. ConsenSys' uPort project wants to rework the internet to make "self-sovereign identity" a reality. (2018)
Coinbase is advancing its push into developing a secure digital identity platform by acquiring San Francisco-based startup Distributed Systems. (2018)
Peter Thiel's data-mining company is using War on Terror tools to track American citizens. The scary thing? Palantir is desperate for new customers. (2018)
Police in Raleigh, North Carolina, have presented Google with warrants to obtain data from mobile phones from not just specific suspects who were i... (2018)
Election officials have insisted that machines can’t be remotely compromised because they’re not “connected to the internet.” But security experts ... (2018)
A stringent set of data protection rules will take effect in Europe in May. Facebook, Google and others are working overtime to be ready. (2018)
The country’s crime classification system is antiquated. Police commanders struggle with no data on an array of technology-based crimes. (2018)
Will 1,500 Street Cameras Be a Wet Blanket in New Orleans? Residents wonder whether the city’s freewheeling appeal will suffer if bars, clubs an... (2018)
Inc.com 2017 Last week's Uber breach is only the tip of the iceberg. Standard security is broken for good (and what you can do about it). (2017)
Hackers stole the personal data of 57 million customers and drivers from Uber Technologies Inc., a massive breach that the company concealed for mo... (2017)
Fast Company, 2017: "For years, credit card companies have relied on an illegible squiggly line as the frontline of defense against credit card fra... (2017)
A guide to basic digital hygiene. This guide is a collection of the most basic digital hygiene tips, starting with the most basic to a bit more niche. (2025)
The app is a major source of raw location data for a multibillion-dollar industry that buys, packages, and sells people’s movements (2024)
The pathway to more widespread web3 adoption starts with familiar web2 onboarding user journeys before branching out further with with non-custodia... (2022)
Open source security scanning platform Snyk, used by developers at companies such as Google and Salesforce, has raised $300 million. The problem... (2021)
A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware... (2021)
While it’s possible to understand Apple’s motivations behind its decision to enable on-device scanning, the company had a better way to satisfy its... (2021)
When acting Danish finance minister Morten Bødskov announced last week that Denmark would soon launch a digital “corona passport,” the news spread ... (2021)
Civil liberties groups have criticized the use of these dragnet search warrants. The search warrant compelled Google to provide police with the ... (2021)
How to reduce tracking, block ads, and encrypt all the things. (2021)
With end-to-end encryption, disappearing messages, and no data collection, there's a lot to love about this privacy-oriented messaging app. (2021)
Democrats blast FTC/Zoom settlement because users won't get compensation. (2020)
The Ninth Circuit Court of Appeals has ruled that LinkedIn can’t deny an analytics company access to publicly accessible information under the anti... (2019)
A quantum computer in the next decade could crack the encryption our society relies on using Shor's Algorithm. (2023)
Quantum Computers, explained with MKBHD Quantum computers aren’t what you've been told. (2023)
VICE News Published on Mar 14, 2018 U.S. intelligence agencies accuse Russia of hacking the 2016 presidential election, a Ben Ferguson travels ... (2018)
LastWeekTonight, 2017: "John Oliver discusses the massive impact of the cybersecurity breach at Equifax and their massively misguided attempts to m... (2017)
Join Jonathan Reichental for an in-depth discussion in this video, Risk and security challenges with using the Internet today, part of Blockchain B... (2018)
Listen to this episode from a16z Podcast on Spotify. Today’s episode is all about crypto security — that is, the new mindsets and the new strategie... (2021)
Given concern around data breaches, the EU Parliament finally passed GDPR (General Data Protection Regulation) after four years of preparation and ... (2018)
The best VPN service for private browsing, fast streaming, and more. Download our free VPN now — or check out Proton VPN Plus for even more premium... (2025)
Surfshark VPN – protect your data online ● Unlimited devices ● 24/7 support ● 3200+ servers in 100 countries ● No-logs policy ● RAM-only servers, a... (2023)
Simplify the security assessment process with hosted vulnerability scanners. Online Vulnerability Scanners to map the attack surface and identify ... (2019)
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of dat... (2019)