Sections

Viewpoints

Is the user the weakest link in security?

When examining breaches, we can almost always point to users practicing poor security — how can we change this?

26 November 2020 min read

Pushing back against IoT attacks intensified by Covid-19

perex__ An unprecedented collaborative effort is vital to stop the plundering of IoT systems

An unprecedented collaborative effort is vital to stop the plundering of IoT systems

5 November 2020 min read

Qanon's path from fringe to mainstream

perex__ Here's what can happen when internet culture is misinterpreted and spirals out of control

Here's what can happen when internet culture is misinterpreted and spirals out of control

23 October 2020 min read

What is post-modern computational propaganda?

perex__ Understanding the various forms of propaganda that exist and how we can spot them

Understanding the various forms of propaganda that exist and how we can spot them

15 October 2020 min read

Canceling the cancel culture

perex__ {value=Garry Kasparov discusses the chilling effect on free speech that can arise as a result of so-called "cancel culture"}

Garry Kasparov discusses the chilling effect on free speech that can arise as a result of so-called "cancel culture"

8 October 2020 min read

Social media vs. democracy

perex__ {value=Although it has the potential to be a powerful democratizing tool, social media can easily become another proxy}

Although it has the potential to be a powerful democratizing tool, social media can easily become another proxy

1 October 2020 min read

Visit Avast website

'The Social Dilemma' has trouble mixing metaphors

perex__ Despite its flaws, the film could be one small step to help us understand the role that social media plays in our lives

Despite its flaws, the film could be one small step to help us understand the role that social media plays in our lives

25 September 2020 min read

Credential stuffing fuels turmoil in U.S. elections, Covid-19 relief

perex__ Automated cyberattacks are torching trust in several local systems that we depend on

Automated cyberattacks are torching trust in several local systems that we depend on

16 September 2020 min read

Life After Privacy: An important new book

perex__ The ‘confessional culture’ created and promoted by social media has eliminated privacy

The ‘confessional culture’ created and promoted by social media has eliminated privacy

10 September 2020 min read

Societal lessons from the Twitter Bitcoin hack

perex__ Tech giants still have a ways to go in fostering cyber hygiene

Tech giants still have a ways to go in fostering cyber hygiene

31 August 2020 min read

How to stay safe when signing EULAs

perex__ Do rights go missing in the space between product and service?

Do rights go missing in the space between product and service?

29 July 2020 min read

Redressing social injustice using AI ethics

perex__ What you ought to know about efforts to bake ethical considerations into surveillance, behavior profiling tools

What you ought to know about efforts to bake ethical considerations into surveillance, behavior profiling tools

24 July 2020 min read