The CIA was secretly granted much more freedom to carry out cyberattacks
Since 2018, the agency has been permitted to approve its own operations, no longer needing White House approval.
Modern-day encryption has ancient cryptography beginnings
How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would often make use of simple...
Big changes to data protection laws in the EU and Brazil
A key ruling in the EU and Brazil's version of the GDPR means privacy safeguards just got strengthened for hundreds of millions of people.
Here’s how firewalls work
In engineering and architecture, firewalls will stop the spread of the flames and contain the damage. Server firewalls follow the same rules.
New semester, new surveillance: How schools plan to monitor students
Amid a pandemic, schools that decide to reopen might implement various invasive methods of monitoring students.
Infographic: The complete mobile security guide in pictures
This visual guide covers mobile security tips, tricks, and best practices and will help secure your phone from the most determined of hackers.
Deep Web vs. Dark Web: They’re not the same thing
These terms are often used interchangeably, but they’re two distinct concepts.
The U.S. Senate will vote on a bill that might eradicate encryption. Here’s what...
The widely-criticized EARN IT Bill, that might eradicate end-to-end encryption, is now up for voting on the U.S. Senate.
Here’s how bug bounties improve security
Software could be the most complex tool created by humans. While it might still be possible for a single individual to understand all the...
Three things we learned from the EFF’s Atlas of Surveillance
Wonder what sort of surveillance your city has? There’s a map for that.
The Electronic Frontier Foundation (EFF) has launched the “largest-ever” searchable database of...