TrueCrypt has been discontinued under mysterious circumstances. We recommend six other disk encryption tools as alternatives.
A new UK TV licensing scam targets British TV owners with phishing emails that threaten to terminate your account if you fail to update your billing information.
This guide teaches you everything you need to know about setting up PGP with Outlook. It covers everything from downloading the programs to sending your first encrypted message.
Learn how to set up PGP encryption for your Gmail using the Mailvelope or FlowCrypt extensions.
Learn about what PGP encryption is, why it was invented and how it works. It relies on a number of cryptographic techniques, including public-key encryption, symmetric-key encryption and digital signatures.
Phishing is often used by hackers to gain access to the target system. In this article, we’ll dive into specific techniques and tools used in phishing.
The Computer Fraud and Abuse Act (CFAA) is an important cybersecurity law. Discover more about the law, how it’s used, and problems with implementation.
AES encryption is the global standard for keeping your online communications safe. Learn what AES does, why it was developed and how it works.
The Houseparty video chat app is designed for young adults, but is especially popular among teens. Parents should be cautious due to some safety concerns.
We sifted through half a dozen illicit goods marketplaces on the dark web to find out just how much frequent flyer miles from hacked accounts are worth.