I had been anticipating this for a while: there has finally been a publicly known case where the social contact between ransomware extortionists and their victims had been broken. The contract? That…

I had been anticipating this for a while: there has finally been a publicly known case where the social contact between ransomware extortionists and their victims had been broken. The contract? That…
It’s history time! While we are discussing Apple vs FBI and the ongoing legal battles over encryption, let’s consider how American politics have already prevented technology from being as good…
Over the past few years, we have had plenty of time to read about the exploits of malicious hackers. These have appeared on the news so many times that we…
It was revealed two months ago that toy company VTech was hacked. The criminals broke in and stole information including the birth dates and addresses of millions of children and their…
Free Basics (under the umbrella of internet.org) is a service by Facebook to bring “essential services” of the internet to the unconnected people of the world for free. Doing so would…
I have advocated password managers in a few previous posts. Here are a few considerations when you go about picking one for your own use: How are your passwords stored?…
Security experts strongly recommend using 2-factor authentication (2FA) for accessing critical accounts, such as your bank account. What precisely does this mean? Authentication methods are divided into three factors: Something…
Short answer: No. Read on. A pattern has been emerging in the last few years of terror attacks: An attack happens, then politicians and spying bureau chiefs call for increased…
The news has been spreading that the Paris shooters planned their attacks using the Playstation 4. Is this true? 1. There is no reason to believe that it is. 2.…
Do you use a lock with the red and white icon as the one in the picture? If so, I hope that you do not think your luggage to be…