Hack the lights: The Italian Job in terms of cybersecurity
We trace how the perception of hackers has evolved based on the classic traffic-light-hacking scheme in three versions (British, American, Indian) of The Italian Job.
102 articles
We trace how the perception of hackers has evolved based on the classic traffic-light-hacking scheme in three versions (British, American, Indian) of The Italian Job.
Decided to invest in cryptocurrency? Read our guide to avoid the most common rookie mistakes and not lose money.
On this podcast, Dave and Jeff look at the repercussions of TikTok being banned in India, an encrypted crime network being cracked, Evil Corp, and more.
This week, Dave and Jeff discuss a crazy story of cyberstalking from eBay, NHS tracing app issues, cryptoexchange money laundering, and more.
On this podcast, Dave and Jeff discuss an insecure smartwatch for kids, Jack Dorsey hacker caught, Black Friday scams and security and more.
A review of the new Netflix documentary, The Great Hack, a take on Cambridge Analytica and life in the social media age in general.
Scammers posing as CIA agents demand ransom for alleged possession of child porn, threatening arrest.
Facebook suing developers from Ukraine, Apex Legends’ battle against cheaters, Facebook’s double-edged sword on privacy, and more.
Artificial intelligence assists judges, police officers, and doctors. But what guides the decision-making process?
Your online privacy does not depend solely on you. We’ll tell you what your loved ones can give away. (Spoiler: It’s absolutely anything, even DNA.)
In the Netherlands, the creators of one of the first ransomware cryptors are on trial, thanks largely to us.
Jeff and Dave discuss a Facebook dating app, Twitter selling data to Cambridge Analytica, and more.
The days of dropping cheesy pick-up lines at social gatherings are coming to an end. With dating websites and apps, it has become way easier to find a partner online. But is it safe?
A story of two amateurs who were able to spy on Italian officials for years without getting caught.
A criminal ring in India posed as technical support and tricked many people, but they couldn’t fool David Jacoby, our senior security researcher.
Ransoc ransomware gathers data from victim’s social networks and hard drives, and uses it to blackmail victims.
Three months in, we report on the development of No More Ransom and the goals we’ve already achieved.
Now, a great number to attract your attention: $16.5 million. This is how much the jackpot was for a lottery ticket one man arranged to win.
Online dating fraud cost victims millions last year. Be vigilant and protect yourself!
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
Everything you need to know about safe posting on any social network, boiled down to five crucial rules.