-
Modern-day encryption has ancient cryptography beginnings
How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would often make use of simple cryptographic tools. Julius Caesar rep...
-
The CIA was secretly granted much more freedom to carry out cyberattacks
This post was originally published on August 7, 2020. Yahoo News has reported that the CIA was granted sweeping powers by President Donald Trump in 2018 to conduct cyberattacks against adversaries of ...
-
To combat fake pandemic news, countries beef up censorship
This post was originally published on August 10, 2020. Since the beginning of this year, countries have been scrambling to control the spread of Covid-19 by placing unprecedented measures and restrict...
-
How (and why) to keep multiple online identities separate
For some, online anonymity is just fun. We can redefine who we are, pretend to be a dolphin, or vent into the void without having to worry what our conservative parents or restrictive boss would think...
-
Face masks do help evade facial recognition tech—for now
This post was originally published on August 15, 2020. Two birds, one stone: Not only do face masks help stem the transmission of the novel coronavirus, but a new study also suggests that they might m...
-
Interested in cybersecurity jobs? You'll need these skills
It’s no secret that cybersecurity jobs are in high demand. The median salary for cybersecurity analysts is about 100,000 USD a year, according to the U.S. Bureau of Labor Statistics. What’s more, ...
-
Lockdowns highlight the need to repair devices ourselves
This post was originally published on August 19, 2020. Since the shift toward remote work and virtual hangouts and meetups, we’ve become evermore dependent on our devices. Phones and laptops have be...
-
Interview: Encryption expert Riana Pfefferkorn on the erosion of online free speech
This post was originally published on August 20, 2020. Riana Pfefferkorn is the associate director of surveillance and cybersecurity at Stanford’s Center for Internet and Society (CIS), a technology...
-
How to improve your email security
No matter if it’s private communication or business, your emails contain practically everything there is to know about you. From your emails, anyone can learn about your work, relationships, vacatio...
-
Instagram stored messages and photos you wanted to delete
According to Instagram, data deleted from its platform takes 90 days to be completely removed from Instagram’s systems. Turns out that was not the case. Independent security researcher Saugat Pokhar...
Featured
