Watch the (verified) birdie, or new ways to recognize fakes
How to tell a real photo or video from a fake, and trace its provenance.
Economics. Eschatology. Infosec.
86 articles
How to tell a real photo or video from a fake, and trace its provenance.
Today we dive into note-taking apps, to-do lists, and diaries that use end-to-end encryption: privacy-focused cousins of popular apps like OneNote, Evernote, Apple’s Notes, and Google Keep.
Got a message from your boss or coworker asking you to “fix a problem” in an unexpected way? Beware of scammers! How to protect yourself and your company against a potential attack.
To go undetected, attackers can operate in your network without any malware at all. How to detect them and prevent damage?
With the EU’s Digital Markets Act having come into effect just days ago, both alternative app stores and true third-party browsers are set to appear on iPhones. How will this affect security, and what are iOS users losing?
Security companies offer smart technologies — primarily cameras — to protect your home from burglary, fire and other incidents. But what about protecting these security systems themselves from intruders? We fill this gap.
Google updates the Android Location History feature. Why the change, and how will this work in the future?
Getting all the benefits of ChatGPT, Copilot, and Midjourney locally — without leaking your data to the internet.
AI tools can be seen everywhere — from operating systems and office suites to image editors and chats. How do you use ChatGPT, Gemini, and the many add-ons to these without jeopardizing your digital security?
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
One-time codes and two-factor authentication securely protect you from account theft. If you receive such a code or a request to enter it when you aren’t logging in, it may be an attempt to hack into your account.
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.
Cybersecurity trends to consider and new threats to protect against in 2024.
Researchers used a hardware hack to bypass Windows Hello biometric authentication on three different devices. Can you trust this login method?
Unused apps not only clutter your phone but also create a risk of personal data leakage, so it’s better to remove them. But what if an app can’t be uninstalled? There’s a workaround.
Espionage operations to hack corporate routers are now commonplace — and all organizations need to be aware of this.
A look at the pros and cons of updating Android — and ways to do it safely.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
Buying a cheap Android device can be an expensive mistake if it fails to perform its primary function or happens to be infected with viruses right out of the box.
Smiley passwords? Why ever not! The pros and cons of using emojis in passwords.