Caution: Misuse of security tools can turn against you
We have a saying in Greece: “They assigned the wolf to watch over the sheep.” In a security context, this is a word of caution about …
We have a saying in Greece: “They assigned the wolf to watch over the sheep.” In a security context, this is a word of caution about …
The National Security Agency isn’t just concerned with spying on the bad guys—and sometimes the good guys—or creating powerful …
Hacking isn’t always hard. Some lower-tier hackers use programs to automatically churn through breached login details to break into other …
In November 2017, online fitness tracker Strava published a heatmap of the activity many of its users around the world engage in (and …
“Inside information has been leaked!” the caption beneath an anonymous video, uploaded last month to YouTube, reads. In the clip, …
Right before Christmas, NSA whistleblower Edward Snowden launched a new app to turn an Android phone into an internet-connected alarm …
Enlarge / IoT products like Amazon Key come with a whole set of risks that consumers aren’t equipped to assess themselves. …
For years security experts have advised users to only connect to password-protected wireless networks to prevent traffic snooping attempts …