Sections

Viewpoints

'The Social Dilemma' has trouble mixing metaphors

Despite its flaws, the film could be one small step to help us understand the role that social media plays in our lives

25 September 2020 min read

Credential stuffing fuels turmoil in U.S. elections, Covid-19 relief

perex__ Automated cyberattacks are torching trust in several local systems that we depend on

Automated cyberattacks are torching trust in several local systems that we depend on

16 September 2020 min read

Life After Privacy: An important new book

perex__ The ‘confessional culture’ created and promoted by social media has eliminated privacy

The ‘confessional culture’ created and promoted by social media has eliminated privacy

10 September 2020 min read

Societal lessons from the Twitter Bitcoin hack

perex__ Tech giants still have a ways to go in fostering cyber hygiene

Tech giants still have a ways to go in fostering cyber hygiene

31 August 2020 min read

How to stay safe when signing EULAs

perex__ {value=Do rights go missing in the space between product and service?}

Do rights go missing in the space between product and service?

29 July 2020 min read

Redressing social injustice using AI ethics

perex__ {value=What you ought to know about efforts to bake ethical considerations into surveillance, behavior profiling tools}

What you ought to know about efforts to bake ethical considerations into surveillance, behavior profiling tools

24 July 2020 min read

Visit Avast website

Preventing cybercrime through environmental design

perex__ Applying community-building principles to improve data protection

Applying community-building principles to improve data protection

22 July 2020 min read

Crowdsourcing security fixes with bug bounties

perex__ Bug bounty programs can greatly benefit businesses and are used by some of the world's biggest tech and government organizations alike.

Bug bounty programs can greatly benefit businesses and are used by some of the world's biggest tech and government organizations alike.

16 July 2020 min read

The Authentication Puzzle

perex__

Producing a secure authentication process that keeps users happy is easier said than done, but it's necessary in order to keep them safe online.

3 July 2020 min read

The anatomy of a phish

perex__ Understanding different types of phishing attacks and the different triggers cybercriminals use to trick users into falling for it.

Understanding different types of phishing attacks and the different triggers cybercriminals use to trick users into falling for it.

26 June 2020 min read

What needs to be done to protect K-12 remote classes

perex__ Parents and school officials must collaborate to operate schools like a digital native start-up instilled with a security culture

Parents and school officials must collaborate to operate schools like a digital native start-up instilled with a security culture

19 June 2020 min read

How smartphones have become one of the largest attack surfaces

perex__ Our smartphone has become an extension of our person, making it a clear attack vector for scammers and hackers

Our smartphone has become an extension of our person, making it a clear attack vector for scammers and hackers

11 June 2020 min read