-
Soggy cardboard? Dropbox says it wasn’t hacked
This post was originally published on October 17, 2014. Snowden called it, apparently. In a recent interview, the NSA whistleblower warned cloud storage users to avoid Dropbox because the service does...
-
Smart meters, dumb security? Hacking the Internet of Things
This post was originally published on October 23, 2014. According to the UK's Department of Energy and Climate Change, almost 100,000 smart meters were installed in homes through the second quarter of...
-
Is Bitly safe? What to know before clicking short links
Shortened URLs are everywhere—on social media, in text messages, and across the web. Services like Bitly turn long web addresses into neat little links that are easy to share. But you might be wonde...
-
OS X Yosemite: Are security and privacy the first thought or an afterthought?
Mac OS X Yosemite (10.10) has arrived and, according to Apple, it comes with safety. Built right in. The company’s claim that security was “The first thought. Not an afterthought,” is both inter...
-
Laura Poitras and the Digital Exiles
This post was originally published on November 14, 2014. This year, documentary filmmaker Laura Poitras released what may be her most controversial project yet: Citizenfour. The film focuses on NSA ...
-
Just looking? ISPs are watching you browse
You are being watched. From everything you ask Alexa to all your emails and passwords: If you don’t encrypt your traffic, your Internet Service Provider (ISP) can potentially see all of it. What’s...
-
Verizon's 'perma-cookie': Just another example of how ISPs invade, threaten our privacy
**Update: Verizon forced 'supercookies' on all of their customers until March 2015, when several senators raised privacy concerns over the practice. One year later, in March 2016, Verizon agreed to a ...
-
Theft from the skies: Could cell phone data theft affect you?
This post was originally published on November 25, 2014. Now that smartphones are everywhere, it’s easy to forget just how remarkable they really are. When you take a moment to think about everythin...
-
No negotiation: The rising threat of crypto ransomware
We all know the rule – you don’t negotiate with terrorists. When you react to their demands, you prove their tactics work. Worse, you give them a reason to continue. In the world of technology, th...
-
Literally malware? The figurative explosion of Uber's app
This post was originally published on December 10, 2014. Last week, The Hacker News posted an article about the mobile app offered by ride-sharing service Uber — turns out a security researcher from...
Privacy news
