Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security
Mar12

Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security

Surely without a hint of irony, just a day after WikiLeaks dumped a vault-load of documents detailing the Central Intelligence Agency’s

Read More
How to improve your computer security, as recommended by Edward Snowden
Mar03

How to improve your computer security, as recommended by Edward Snowden

Yahoo Inc. said on Wednesday its senior executives failed to “properly comprehend or investigate” a 2014 security breach…

Read More
Cyber Security: Top 7 Crisis Management Tips
Feb28

Cyber Security: Top 7 Crisis Management Tips

Unauthorised disclosure of personal information can arise from either accidental or deliberate actions of employees, hackers or disgruntled customers

Read More
One-third of US companies breached last year, consumers pay the price
Feb20

One-third of US companies breached last year, consumers pay the price

Paying exclusively with cash or avoiding internet retail isn’t enough – using an email account from a company like Yahoo can place personal information at risk.

Read More
The End of Anonymous Browsing: Multi-Browser Digital Fingerprinting Perfected
Feb16

The End of Anonymous Browsing: Multi-Browser Digital Fingerprinting Perfected

Researchers have developed a technique that allows websites to track visitors that use more than one browser to access the internet, a key defense employed

Read More
Change your WhatsApp security settings NOW:
Feb13

Change your WhatsApp security settings NOW:

WhatsApp claims it is one of the safest messaging services available because it offers end-to-end encryption.

Read More