Online shopping with a VPN: Find deals and protect yourself this...
Stand aside, brick-and-mortar stores: Online shopping has been growing exponentially, bringing with it undeniable upsides, but also a few...
How brute-force attacks reveal your passwords
A brute-force attack is an attempt to discover—or “crack”—your password through repeated guessing. On public-facing login screens, most web services...
The secret codes that nobody can crack
Remember back in school, when you and your best friend would exchange secret notes across the classroom in code?...
5 most shocking cyber scams of 2017
The results are in and 2017 is already being called the worst year in terms of cyber scams. Where...
Here’s what happens when companies fail to put privacy first
You could easily call 2017 the year of the leaks. With so much sensitive and potentially incriminating evidence hitting...
Your YouTube history exposed: Researcher identifies inherent security flaw in video...
This post was originally published on March 22, 2017. While researching how Internet Service Providers (ISPs) could optimize their services...
I’m sorry, Dave. I’m afraid I can’t do that: When virtual...
The Wall Street Journal estimates that one million IoT devices were recently used by hackers to carry out a...
Unhackable notifications: It’s easy to encrypt Facebook with a PGP key
If you've ever wanted to optimize your online security with PGP keys, start with Facebook’s encrypted notifications feature.
The Siri-ous benefits and dangers of voice technology
“Hey, Siri” Ask any iOS user if they’ve uttered the above, and they’ll share personal anecdotes of sketchy queries and...
5 ways the Internet of Things could kill you
Most new gadgets conveniently connect to the internet. But there's also a chance the Internet of Things (IoT) could kill you.