Lexie

Lexie

Lexie is the blog's resident tech expert and gets excited about empowerment through technology, space travel, and pancakes with blueberries.

  • Here's how bug bounties improve security

    Here's how bug bounties improve security

    Software could be the most complex tool created by humans. While it might still be possible for a single individual to understand all the functioning parts of a car or telephone, it’s unlikely any o...

    Lexie 20.07.2020 3 mins
  • What is malware? How viruses, trojans, and ransomware work

    What is malware? How viruses, trojans, and ransomware work

    Malware, or "malicious software," is a term for a variety of viruses, spyware, or ransomware (cryptolockers) that cause harm to a user, their data, or devices. The term malware implies malicious inten...

    Lexie 23.06.2020 3 mins
  • What is malware? How viruses, trojans, and ransomware work

    What is malware? How viruses, trojans, and ransomware work

    Malware, or "malicious software," is a term for a variety of viruses, spyware, or ransomware (cryptolockers) that cause harm to a user, their data, or devices. The term malware implies malicious inten...

    Lexie 23.06.2020 3 mins
  • How do advertisers always know where you are?

    How do advertisers always know where you are?

    To build a profile of you, advertisers can gather a multitude of information. They can follow you around the web using a tracking code, browser fingerprinting, store cookies on your machine, or even b...

    Lexie 19.05.2020 2 mins
  • What is cybertorture? How our minds are vulnerable to online experiences

    What is cybertorture? How our minds are vulnerable to online experiences

    What will change if we are forced to move our social circle to virtual lands, browse the web anonymously, and stay permanently at home? Will there still be any crime? Will nations still exist, and wil...

    Lexie 24.04.2020 3 mins
  • 8 anti-spam techniques your email uses to prevent spam

    8 anti-spam techniques your email uses to prevent spam

    It’s difficult to define exactly what constitutes email spam. What might be a useful newsletter to one person could be unwanted advertising to another, and a welcome business opportunity will be ill...

    Lexie 13.03.2020 5 mins
  • Global Internet and Social Media Censorship Report, 2020

    Global Internet and Social Media Censorship Report, 2020

    NOTE: This post was originally published on January 24, 2020 Around the world, internet censorship remains a popular tool of authoritarian governments to prevent information from spreading, to stop pe...

    Lexie 24.01.2020 13 mins
  • Facebook’s cryptocurrency has governments scrambling

    Facebook’s cryptocurrency has governments scrambling

    There are over 2,000 cryptocurrencies, tokens, and blockchain instruments commonly traded on more than 250 platforms around the world. Some of these currencies are created by pseudonymous individuals ...

    Lexie 15.11.2019 5 mins
  • Is your car spying on you?

    Is your car spying on you?

    Unlike many other devices, cars are not prefixed with the word smart. Even if they’re connected to the internet—and have the ability to collect and sell your data to third parties. And yet, thatâ€...

    Lexie 20.09.2019 3 mins
  • What is a CA certificate, and how does it work?

    What is a CA certificate, and how does it work?

    Recently, the government of Kazakhstan temporarily forced citizens to install a Certificate Authority (CA) that allowed the state to decrypt all content and communications in a man-in-the-middle attac...

    Lexie 13.08.2019 3 mins
Get Started