It’s not only machines that can be hacked – criminals can use social engineering to “hack humans” too. Find out more about this tactic and how to avoid it.
Facial recognition is now mainstream. There’s a new battle is between privacy and surveillance, and it’s moving fast. Who will come out the winner?
The development of AI techniques has seen Artificial Intelligence (AI) start to appear in a lot of different IT products, including in the field of cybersecurity. Read about the leading cybersecurity companies spearheading AI initiatives.
Freelance scams are everywhere. Here are 10 common scams targeting freelancers that both new and experienced freelancers should be wary of.
We discuss some of the most common charity fraud schemes making the rounds and provide tips on how to securely donate online.
Everything you need to know about the TLS protocol. This article covers what it is, how it works, its many different uses as well as its security problems.
Having your phone stolen can be gut-wrenching. We explain what to do if your phone is stolen and provide best practices for securing a new or existing phone.
MacOS malware exists and it’s important to know the risks. We explore whether or not Mac users need antivirus protection and offer additional security tips.
3DES used to be one of the most prominent forms of encryption. It is based on the DES algorithm, but has since been superseded by AES in most use cases.
Learn everything you need to know about IPsec. Find out about its different protocols, modes, uses, as well as its known security issues.