
Privacy under attack: nasty surprises in Chrome, Edge, and Firefox
How to counter new privacy invasions by browser developers
Economics. Eschatology. Infosec.
109 articles
How to counter new privacy invasions by browser developers
We dive into the mechanics of the controversial nude-scanning app that has mysteriously materialized on a billion phones.
Reasons for updating your ESXi infrastructure ASAP, and enterprise threats that VM escape poses.
Takeaways for regular crypto holders from the biggest crypto heist in history.
What information does an MDR service need to protect a company from complex targeted attacks?
We break down the most covert mechanism of smartphone surveillance using real-life examples.
Everything you wanted to know about meme cryptocurrencies — such as TRUMP and DOGE — and ways to win or lose big.
We look into every method of hijacking WhatsApp, Telegram, and other messaging accounts – from quishing to fake gifts and viruses, and ways to protect yourself against them.
What network-security and access-control tools do the world’s top cyber-regulators recommend to companies?
The complete story of the hype, panic, and misunderstanding surrounding attacks on cryptographic algorithms using quantum computers.
Hundreds of new gadgets and smart appliances are traditionally unveiled every January at the Consumer Electronics Show in Vegas. How will they affect our cybersecurity?
How to avoid giving away your password to scammers when logging in to third-party sites or viewing “encrypted” or “confidential” documents.
Attacks on companies via their suppliers and contractors are becoming increasingly widespread. How can you manage this risk?
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
The best privacy-focused services that make practical gifts for friends and family.
How a simple, well-known general threat became a key targeted-attack vector on companies.
Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.
Five dead simple tips to greatly improve your defenses against cybercriminals.
Analyzing incidents and drawing lessons from them should be an integral part of the incident response process. This can help improve the overall security level of a company.
Web pages often disappear, move, or change content. How to keep them the way you want, or easily locate a web archive?
Discontinuing mandatory password rotations, banning outdated MFA methods, and other updates in the NIST SP 800-63 standards for digital account authentication and management.