-
Here's how bug bounties improve security
Software could be the most complex tool created by humans. While it might still be possible for a single individual to understand all the functioning parts of a car or telephone, it’s unlikely any o...
-
What is malware? How viruses, trojans, and ransomware work
Malware, or "malicious software," is a term for a variety of viruses, spyware, or ransomware (cryptolockers) that cause harm to a user, their data, or devices. The term malware implies malicious inten...
-
What is malware? How viruses, trojans, and ransomware work
Malware, or "malicious software," is a term for a variety of viruses, spyware, or ransomware (cryptolockers) that cause harm to a user, their data, or devices. The term malware implies malicious inten...
-
How do advertisers always know where you are?
To build a profile of you, advertisers can gather a multitude of information. They can follow you around the web using a tracking code, browser fingerprinting, store cookies on your machine, or even b...
-
What is cybertorture? How our minds are vulnerable to online experiences
What will change if we are forced to move our social circle to virtual lands, browse the web anonymously, and stay permanently at home? Will there still be any crime? Will nations still exist, and wil...
-
8 anti-spam techniques your email uses to prevent spam
It’s difficult to define exactly what constitutes email spam. What might be a useful newsletter to one person could be unwanted advertising to another, and a welcome business opportunity will be ill...
-
Global Internet and Social Media Censorship Report, 2020
NOTE: This post was originally published on January 24, 2020 Around the world, internet censorship remains a popular tool of authoritarian governments to prevent information from spreading, to stop pe...
-
Facebook’s cryptocurrency has governments scrambling
There are over 2,000 cryptocurrencies, tokens, and blockchain instruments commonly traded on more than 250 platforms around the world. Some of these currencies are created by pseudonymous individuals ...
-
Is your car spying on you?
Unlike many other devices, cars are not prefixed with the word smart. Even if they’re connected to the internet—and have the ability to collect and sell your data to third parties. And yet, thatâ€...
-
What is a CA certificate, and how does it work?
Recently, the government of Kazakhstan temporarily forced citizens to install a Certificate Authority (CA) that allowed the state to decrypt all content and communications in a man-in-the-middle attac...