If you're looking to boost your career in application security, there is no better place to start than by reading a copy of Tanya Janca’s new book, Alice and Bob Learn...
If you're looking to boost your career in application security, there is no better place to start than by reading a copy of Tanya Janca’s new book, Alice and Bob Learn...
Phishing is the most prolific category of cyber scam. Others include romance scams, mugged in London scams, advance fee frauds and many more. Most scams seek to part you from your money...
The good news is there is no lack of privacy settings in Windows 10. In fact, there are so many privacy settings that some are unknown to most users! The bad...
Several countries — and now individual US states — are planning or have rolled out their smartphone-based contact tracing apps. These apps are designed so that local health agencies can figure...
In the beginning, Apple products stood high, wide, and handsome in the face of cyberattacks. Average hackers found it nearly impossible to crack the company’s proprietary software, and an Apple product’s attack surface was...
We continue our series from the Digital Sanity Summit with advice from the Council of Europe’s own Dr. Elizabeth Milovidov, law professor and eSafety consultant. Dr. Milovidov is a mother...
Recent Comments