Filter Posts
Literally malware? The figurative explosion of Uber’s app
The internet is blowing up with discussion over Uber's app, mobile permissions, and what it really means to be malware.
Your data, your rules: The encryption of everything
Who owns your data? The common sense answer is obvious, but isn't always true: in certain situations, law enforcement...
No negotiation: The rising threat of crypto ransomware
We all know the rule – you don’t negotiate with terrorists. When you react to their demands, you prove...
Theft from the skies: Could cell phone data theft affect you?
Recent discoveries have revealed that the NSA has been stealing cellular data right out of the air.
Just looking? ISPs are watching you browse
You are being watched. From everything you ask Alexa to all your emails and passwords: If you don’t encrypt...
Laura Poitras and the Digital Exiles
Documentary filmmaker Laura Poitras moved to Berlin in order to protect the source material for her documentary on Edward Snowden.
OS X Yosemite: Are security and privacy the first thought or...
Mac OS X Yosemite (10.10) has arrived and, according to Apple, it comes with safety. Built right in. The company’s...
Don’t get bit: URL-shortening service flagged as malware
This article was originally published on November 6, 2014. If you can't trust Bitly, who can you trust? Citizens of...
Verizon’s ‘perma-cookie’: Just another example of how ISPs invade, threaten our...
**Update: Verizon forced 'supercookies' on all of their customers until March 2015, when several senators raised privacy concerns over...
Smart meters, dumb security? Hacking the Internet of Things
With increasing smart energy meters on the market, it's possible for hackers to spoof identities or cut off power to specific homes.