What you should do when deleting an app from your phone
Removing an app from your phone does not mean you’ve deleted your account on the service. The app maker still has your information.
Log4j vulnerability: ExpressVPN delivers protection against Log4Shell
ExpressVPN has rolled out a protective layer for the Log4j vulnerability. All ExpressVPN users benefit from this protection.
8 of the biggest crypto thefts of all time
The world just saw what was possibly the largest crypto heist yet—after which the hacker returned all of the stolen 600 million USD.
Is this attack a hack… or hacktivism?
We take a look at examples of hacktivism, well-known groups like Anonymous, and the pros and cons of hacktivism.
What is Pegasus spyware? And how to protect your phone
Pegasus is phone hacking software used by governments. Read how it can be secretly installed on your phone remotely.
Government hacking: How countries surveil their own citizens
There have been numerous incidents in which governments have broken into encrypted apps. This puts your privacy at risk and raises cybersecurity concerns.
Frightening reality: You can buy ransomware as a service
Ransomware attacks were once carried out by skilled hackers. Now, anyone with a credit card can theoretically launch them. Case in point: the Colonial Pipeline hack.
New AI tech bodes ill for identity theft, scams, and propaganda
Artificial intelligence like GPT-3 is advancing deepfakes by imitating real faces, voices, and words. This could spell trouble for the future of humanity.
The battle to outlaw end-to-end encryption in the U.S. is heating...
This post was originally published on July 2, 2020. Following the introduction of the EARN IT bill in the U.S....
5 famous whistleblowers who risked everything
“See something, say something” is a safety and awareness campaign running across multiple cities in the United States. If you...