josh lake

Josh Lake

Josh Lake is a writer who focuses on the intersections between technology, privacy and security. His work helps companies and individuals get the most out of technological developments, without having to sacrifice their civil liberties or open themselves up to the ever-increasing threats of cybercrime.

Articles by Josh

Federated learning is a new approach for training the algorithms we use every day. But what actually is federated learning and is it really more private? We explain everything you should know about this new algorithm model. 
By Josh Lake in Information Security on October 25, 2019
From sending fake invoices to manipulating employees into wiring them money, hackers have a wide range of business email compromise techniques that they use to defraud companies.
By Josh Lake in Information Security on July 6, 2020
Remote wiping your laptop or PC, coupled with full disk encryption, is the best way to protect your data if a computer is lost or stolen. This article explains the advantages of both and how to do them. 
By Josh Lake in Information Security on June 20, 2023
Credential stuffing attacks are important to understand so you can keep your personal and business accounts safe. We explain how credential stuffing attacks work and how you can minimize the risk of attacks. 
By Josh Lake in Information Security on January 26, 2024
There are so many different messaging apps on offer, and the differences can be highly technical. Check out our guide for a simple rundown of which apps you should be using to keep your data secure and private.
By Josh Lake in Information Security on April 13, 2022
Governments keep calling for tech companies to insert backdoors into their encrypted services. Find out what this actually means, and how these systems could damage global security.
By Josh Lake in VPN & Privacy on December 2, 2019
Steganography is the study and practice of concealing communication. It plays a different role to cryptography, with its own unique applications and strengths.
By Josh Lake in Information Security on December 29, 2023
Electronic voting and internet voting seem like excellent ways to improve our election systems. But in reality, things aren't so straightforward.
By Josh Lake in Information Security on April 12, 2022
Blockchains are built with a range of different cryptographic concepts. Find out what they are and how they work in our step-by-step guide.
By Josh Lake in Crypto on February 8, 2024
Page 4 of 6