Data and device security for domestic abuse survivors

Many domestic abuse survivors need help before stalkerware strikes. Here, we give basic advice on device security and protecting sensitive data.

Read more

Backdoors are a security vulnerability

Upset by their inability to access potentially vital evidence for criminal investigations, the federal government has, for years, pushed to convince tech companies to build backdoors that will, allegedly, only be used by law enforcement agencies. The problem, cybersecurity researchers say, is that those backdoors can easily be exploited by criminals.

Read more

How to securely send your personal information

On its own, email is not safe for sending credit card or passport numbers. Here’s how to securely send personal information over the Internet.

Read more

Mozilla urges Apple to make privacy a team sport

Mozilla is currently pushing Apple into placing extra barriers between iPhone users and online advertisers. Why? Because, according to Mozilla, it could work, which could benefit users everywhere.

Read more

Facebook’s history betrays its privacy pivot

Facebook’s self-proclaimed pivot to privacy faces a fierce opponent—Facebook’s own history.

Read more

Compromising vital infrastructure: communication

In the series about vital infrastructure we look at communication. How vital is it? How is malware a threat and even how does malware show us the way to secure communication?

Read more

Merging Facebook Messenger, WhatsApp, and Instagram: a technical, reputational hurdle

Facebook’s plan to integrate secure messaging across Messenger, WhatsApp, and Instagram will demand technical know-how and a fierce commitment to user privacy.

Read more

Marriott breach impacts 500 million customers: here’s what to do about it

Marriott disclosed a large-scale data breach impacting up to 500 million customers who have stayed at a Starwood-branded hotel within the last four years.

Read more

The many faces of omnichannel fraud

There’s a new kind of fraud out there, and it’s after organizations that have embraced omnichannel, a strategy that focuses on improved user experience. We take a look at what omnichannel is, the kinds of fraud that can affect businesses using this approach, and how they can protect themselves—and their clients.

Read more

Malware analysis: decoding Emotet, part 2

In part two of our series on decoding Emotet, we analyze the PowerShell code flow and structure. We also reconstruct the command-line arguments—for fun!

Read more

Select your language