-
Face masks do help evade facial recognition tech—for now
This post was originally published on August 15, 2020. Two birds, one stone: Not only do face masks help stem the transmission of the novel coronavirus, but a new study also suggests that they might m...
-
How (and why) to keep multiple online identities separate
For some, online anonymity is just fun. We can redefine who we are, pretend to be a dolphin, or vent into the void without having to worry what our conservative parents or restrictive boss would think...
-
To combat fake pandemic news, countries beef up censorship
This post was originally published on August 10, 2020. Since the beginning of this year, countries have been scrambling to control the spread of Covid-19 by placing unprecedented measures and restrict...
-
The CIA was secretly granted much more freedom to carry out cyberattacks
This post was originally published on August 7, 2020. Yahoo News has reported that the CIA was granted sweeping powers by President Donald Trump in 2018 to conduct cyberattacks against adversaries of ...
-
Modern-day encryption has ancient cryptography beginnings
How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would often make use of simple cryptographic tools. Julius Caesar rep...
-
Big changes to data protection laws in the EU and Brazil
If you’re one of the 656 million people who live in the EU or Brazil, then a series of recent developments might impact the way companies like Facebook and Google handle your data. The first, a ruli...
-
New semester, new surveillance: How schools plan to monitor students
This post was originally published on July 28, 2020. It is somehow almost September, which normally signals the start of another school year for many children and university students. While Covid-19 h...
-
Infographic: How your phone gives up your privacy
Want more tips on staying private and secure on your mobile devices? Read our comprehensive mobile security guide.
-
U.S. Senate to vote on EARN IT bill, endangering encryption
The EARN IT bill, which would make tech companies liable for the behavior of its users, was unanimously approved by a U.S. Senate committee on July 2 and will be presented for a vote on the Senate flo...
-
Here's how bug bounties improve security
Software could be the most complex tool created by humans. While it might still be possible for a single individual to understand all the functioning parts of a car or telephone, it’s unlikely any o...
Featured
