Quantum computers and cryptography for dummies
We explore how encryption protects your data and why quantum computers might shake things up.
3201 articles
We explore how encryption protects your data and why quantum computers might shake things up.
On this podcast, Dave and Jeff look at the repercussions of TikTok being banned in India, an encrypted crime network being cracked, Evil Corp, and more.
It turns out that the tale of Ali Baba is a collection of stories from ancient Persia about … cyberthreats?
We developed a sandbox capable of emulating a company-specific system in an isolated environment.
On this podcast, Dave and Jeff look at why Israel is using fish to fight hackers, why Google will pay for you to read news and how Facebook helped the FBI hack Tails OS.
An integrated approach arms even small companies with automated tools that repel complex attacks.
A few stories about how easy it is to accidentally leak sensitive information into the public domain.
At WWDC 2020, Apple rolled out App Clips for iOS. We explain what that — as well as Android Instant Apps — is.
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
Dave and Jeff discuss the underground trade of pirated OnlyFans porn, World of Warcraft bots, an alleged arsonist’s public posts getting her nabbed by the FBI, and more.
Zoom developers have made their service more secure. We review what’s changed.
Our experts uncovered a scheme to extract cardholder data using Google tools.
Israeli experts claim that hundreds of millions of IoT devices contain critical vulnerabilities — and that’s the most conservative estimate.
To protect ADAS from external interference, cars need a special approach to cybersecurity.
This week, Dave and Jeff discuss a crazy story of cyberstalking from eBay, NHS tracing app issues, cryptoexchange money laundering, and more.
A particular type of malware seeks user credentials, including accounts for gaming services such as Origin, Battle.net, and Uplay.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
We explain how to keep your computer running fast without sacrificing protection.