Back to Categories

CYBER SECURITY

Category

Search Keyword

Search for content with this keyword

Chunks within this category

a look at encryption, and it's importance in computer science and cyber security (privacy, etc)
a look at encryption, and it's importance in computer science and cyber security (privacy, etc)
a collection of articles to look at web security risks with Javascript
a look at encryption, and it's importance in computer science and cyber security (privacy, etc)
VPN - virtual private networks and Encryption and Cybersecurity
a collection of articles and videos about How to pack for (long-term) travel
WhatsApp, Signal, Telegram (and other messaging apps) - business model
a collection of articles about Telegram and their messaging app
a collection of articles with Practical tips for protecting your Privacy (internet)
Encryption, Cybersecurity and Legal Issues, Law Enforcement
Remote working and Surveillance, Security, Privacy Issues
examining issues related to privacy, surveillance and security in the workplace
a collection of articles and videos about Surveillance and Privacy
Quantum Computing - and issues with encryption, cybersecurity
Vaccine Passports - Travel, Testing, Privacy issues and COVID19 - Coronavirus
Life360 - privacy issues and location-tracking app for parents, kids
Public WiFi hotspots - getting access to the internet while traveling - security issues
a collection of articles, videos and resources examining issues related to privacy and security at universities
a collection of articles, videos and resources examining issues related to Data, privacy and surveillance issues - examples of companies selling or leaking data
a collection of articles and videos about Surveillance and Privacy
a collection of articles exploring (possible) dystopian possibilities of City-wide surveillance cameras, AI and Privacy (internet)
a collection of articles looking at how technology is being used to enhance Elementary and Preschool Education
a collection of articles looking at how technology is being used to enhance Elementary and Preschool Education
a collection of videos and articles looking at the motivation behind creating and using the Blockchain: Risk and security challenges with using the Internet today
A collection about Blockchain, Digital Identity and Cybersecurity
A collection about Monero - Blockchain, Digital Identity and Cybersecurity
Telegram and blockchain tokens
Custody issues - Cryptocurrency Wallets - Storing Crypto assets, Bitcoin, other tokens
A collection about Blockchain, Digital Assets and Cybersecurity

Resources within this category

Article

Stop the EARN IT Bill Before It Breaks Encryption | EFF Action Center

The House and Senate are both pushing forward with the so-called “EARN IT” Act, a bill that will undermine encryption and free speech online. Attor... (2020)


Article

Why airport USB charging stations are actually dangerous

USB charging stations at airports can actually be dangerous, as cybercriminals often use them to install malware on your device or transmit unwante... (2019)


Article

Microsoft, Facebook, trust and privacy — 2019 - Benedict Evans

There are strong parallels between organised abuse of Facebook and FB’s attempts to respond, in the last 24 months, and malware on Windows and Offi... (2019)


Article

How to Safeguard Your Tech, and Your Money, While Traveling - The New York Times

Getting a “throwaway” email for online booking is one tip experts offer. Another: Consider signing up for a credit card only for online purchases. (2019)


Article

F2Pool Founder's Crypto Wallet Startup Raises $13 Million in New Funding - CoinDesk

Cobo, the crypto wallet created by F2Pool's founder, has raised $13 million from NEO and DHVC to expand its staking pool with a cold wallet launch. (2018)


Article

Monero to Become First Billion-Dollar Crypto to Implement 'Bulletproofs' Tech - CoinDesk

A highly anticipated technology designed to make blockchain privacy features more scalable will be tested on Monero soon. (2018)


Article

The $1 Trillion Wallet: BitGo's Bid to Bring Bitcoin to Wall Street and Beyond - CoinDesk

Blockchain security startup BitGo is gearing up to safeguard once-unthinkable sums of digital assets as it looks towards a tokenized future. (2018)


Article

In the Scramble to Fix Digital Identity, uPort Is a Project to Watch - CoinDesk

Digital identity is scattered and insecure. ConsenSys' uPort project wants to rework the internet to make "self-sovereign identity" a reality. (2018)


Article

Coinbase Acquires Digital Identity Startup Distributed Systems - CoinDesk

Coinbase is advancing its push into developing a secure digital identity platform by acquiring San Francisco-based startup Distributed Systems. (2018)


Article

Palantir Knows Everything About You | Bloomberg

Peter Thiel's data-mining company is using War on Terror tools to track American citizens. The scary thing? Palantir is desperate for new customers. (2018)


Article

Police are asking Google to provide user data for all people near crime scenes

Police in Raleigh, North Carolina, have presented Google with warrants to obtain data from mobile phones from not just specific suspects who were i... (2018)


Article

The Myth of the Hacker-Proof Voting Machine - The New York Times

Election officials have insisted that machines can’t be remotely compromised because they’re not “connected to the internet.” But security experts ... (2018)


Article

Tech Giants Brace for Europe’s New Data Privacy Rules - The New York Times

A stringent set of data protection rules will take effect in Europe in May. Facebook, Google and others are working overtime to be ready. (2018)


Article

An ‘Iceberg’ of Unseen Crimes: Many Cyber Offenses Go Unreported - The New York Times

The country’s crime classification system is antiquated. Police commanders struggle with no data on an array of technology-based crimes. (2018)


Article

Will Everything Stay in New Orleans If Cameras Capture It All? - The New York Times

Will 1,500 Street Cameras Be a Wet Blanket in New Orleans? Residents wonder whether the city’s freewheeling appeal will suffer if bars, clubs an... (2018)


Article

How To Prevent Fraud When You Can Not Trust Your Customers

Inc.com 2017 Last week's Uber breach is only the tip of the iceberg. Standard security is broken for good (and what you can do about it). (2017)


Article

Uber Paid Hackers to Delete Stolen Data on 57 Million People

Hackers stole the personal data of 57 million customers and drivers from Uber Technologies Inc., a massive breach that the company concealed for mo... (2017)


Article

MasterCard has finally realized that signatures are obsolete and stupid

Fast Company, 2017: "For years, credit card companies have relied on an illegible squiggly line as the frontline of defense against credit card fra... (2017)


Article

Digital hygiene | karpathy

A guide to basic digital hygiene. This guide is a collection of the most basic digital hygiene tips, starting with the most basic to a bit more niche. (2025)


Article

Life360 Is Selling Precise Location Data on Its Tens of Millions of Users – The Markup

The app is a major source of raw location data for a multibillion-dollar industry that buys, packages, and sells people’s movements (2024)


Article

The Missing Link Between Web2 and Web3: Custody | Future

The pathway to more widespread web3 adoption starts with familiar web2 onboarding user journeys before branching out further with with non-custodia... (2022)


Article

Open source security scanning platform Snyk raises $300M | VentureBeat

Open source security scanning platform Snyk, used by developers at companies such as Google and Salesforce, has raised $300 million. The problem... (2021)


Article

What is Pegasus? A cybersecurity expert explains how the spyware invades phones and what it does when it gets in

A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware... (2021)


Article

Apple’s Mistake – Stratechery by Ben Thompson

While it’s possible to understand Apple’s motivations behind its decision to enable on-device scanning, the company had a better way to satisfy its... (2021)


Article

Why Denmark’s “corona passport” is more of a promise than a plan | MIT Technology Review

When acting Danish finance minister Morten Bødskov announced last week that Denmark would soon launch a digital “corona passport,” the news spread ... (2021)


Article

Minneapolis police tapped Google to identify George Floyd protesters – TechCrunch

Civil liberties groups have criticized the use of these dragnet search warrants. The search warrant compelled Google to provide police with the ... (2021)


Article

These 6 browser extensions will protect your privacy online

How to reduce tracking, block ads, and encrypt all the things. (2021)


Article

What is Signal? The basics of the most secure messaging app.

With end-to-end encryption, disappearing messages, and no data collection, there's a lot to love about this privacy-oriented messaging app. (2021)


Article

Zoom lied to users about end-to-end encryption for years, FTC says

Democrats blast FTC/Zoom settlement because users won't get compensation. (2020)


Article

Scraping public data from a website probably isn’t hacking, says court

The Ninth Circuit Court of Appeals has ruled that LinkedIn can’t deny an analytics company access to publicly accessible information under the anti... (2019)


Video

How Quantum Computers Break The Internet... Starting Now

A quantum computer in the next decade could crack the encryption our society relies on using Shor's Algorithm. (2023)


Video

Quantum Computers, explained with MKBHD

Quantum Computers, explained with MKBHD Quantum computers aren’t what you've been told. (2023)


Video

How Israel Rules The World Of Cyber Security, VICE on HBO, Full Episode

VICE News Published on Mar 14, 2018 U.S. intelligence agencies accuse Russia of hacking the 2016 presidential election, a Ben Ferguson travels ... (2018)


Video

Equifax: Last Week Tonight with John Oliver (HBO)

LastWeekTonight, 2017: "John Oliver discusses the massive impact of the cybersecurity breach at Equifax and their massively misguided attempts to m... (2017)


Video

Risk and security challenges with using the Internet today: Blockchain | LinkedIn Learning (video)

Join Jonathan Reichental for an in-depth discussion in this video, Risk and security challenges with using the Internet today, part of Blockchain B... (2018)


Podcast

Crypto Security and the New Web3 Mindsets for Users - a16z Podcast | Podcast on Spotify

Listen to this episode from a16z Podcast on Spotify. Today’s episode is all about crypto security — that is, the new mindsets and the new strategie... (2021)


Podcast

What to Know about GDPR – a16z Podcast: Andreessen Horowitz

Given concern around data breaches, the EU Parliament finally passed GDPR (General Data Protection Regulation) after four years of preparation and ... (2018)


Website

Proton VPN: Secure, fast VPN service in 110+ countries

The best VPN service for private browsing, fast streaming, and more. Download our free VPN now — or check out Proton VPN Plus for even more premium... (2025)


Website

Surfshark: secure online VPN service & more

Surfshark VPN – protect your data online ● Unlimited devices ● 24/7 support ● 3200+ servers in 100 countries ● No-logs policy ● RAM-only servers, a... (2023)


Website

 Hacker Target. com

Simplify the security assessment process with hosted vulnerability scanners. Online Vulnerability Scanners to map the attack surface and identify ... (2019)


Website

SQLmap: automatic SQL injection and database takeover tool

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of dat... (2019)


Content Stats

95 Articles
5 Videos
2 Podcasts
1 Notes
4 Websites
46 Chunks