Security

A Basic Guide to Cryptographic Protocols

A Basic Guide to Cryptographic Protocols

The world is full of protocols. They aren't specifically a technology thing either. The word protocol refers to the official way that things are done. It's a set of rules, rituals, and actions that...
Digital Healthcare Cyber Attack

1.5 Million Citizens Affected in Singapore’s Worst Cyber Attack Yet

Local media from Singapore report a cyber attack that involved the theft of personal patient profiles and prescriptions of over a million citizens. The Ministry of Health of Singapore was targeted by...
These Are the Encryption Algorithms That Pack the Biggest Punch

These Are the Encryption Algorithms That Pack the Biggest Punch

Encryption is the art of taking information that can be read by anyone and then encoding it. Done in such a way that only someone with the right "key" can unscramble it again. Encryption...
Venmo

Vulnerability Found in Venmo Public API Causing Massive Data Leak

A privacy advocate discovered a vulnerability in Paypal-owned Venmo app’s API which has led to a large number of transactions being leaked by the app. The Venmo API has transaction records set...
Samsung Service Center

Security Researchers Discover Malware Targeting Samsung Service Centers

Two security research companies have released reports that detail a malware campaign and exploit chain meant for Samsung service centers. Both Russian and Italian service centers have also been attacked in a...
What is HTTPS and Why is it so Important

What is HTTPS and Why is it so damn Important?

If you’re like most people, you probably don’t spend a lot of time thinking about the thousands of technologies that underlie your internet experience. As long as you can type in an internet address...
Tor vs VPN

Tor Vs VPN: What You Need to Know & Which Privacy-Related Technology to Use?

It’s true that various cyber-security and privacy-related communities can seem a little closed-off to the general public. Tech jargon abounds and it can be hard to get a straight answer on the pros and...
VPNfilter

Ukraine Stopped Potentially Catastrophic VPNFilter Malware Attack

Ukraine's secret service reports that it stopped a potentially disastrous malware attack on a chlorine distillation plant. The attack involved VPNFilter which attacks in three separate stages and can't be stopped by a reboot....
Piracy

BREIN’s Win Over Newsconnection Spells Trouble for Usenet Pirates

The debate regarding rights to privacy and the rights of law enforcers resulted in an interesting case in the Netherlands this week. BREIN, an anti-piracy organization, won a case requesting Internet users' private...
What the Difference Between Digital Signatures and Digital Certificates

What the Difference Between Digital Signatures and Digital Certificates

What is it that makes the modern web work? If your answer has something to do with the software and hardware that the physical infrastructure of the web is built from, well you’re partly...