Introduction To Cryptography
Cryptography is something that we all depend on at least indirectly (it protects your online banking activity and your credit card information, passwords, and other sensitive information), but it is a...
What Is Crypto Mining Malware?
Mining malware has been on the rise and more hackers discover that they can make money easily by mining cryptocurrencies. Mining cryptocurrencies is not a no-brainer for everyone because it costs...
Android Vulnerability Lets Hackers Take Over Your Camera
A security vulnerability in some Android phones allows attackers to access your camera app and invade your privacy (it can even get location data from the photos it takes). The vulnerability...
What are the 5 Best Ways to Burglarproof your Home?
While there are some state-of -the-art security systems that might cost you an arm and a leg, securing your home from burglars and petty thieves doesn't have to be ridiculously expensive.
Owning...
Compromised Emails Are One Of Your Greatest Security Threats
A compromised e-mail account is one of the greatest security threats you face online. It can lead to robbery, a complete takeover of your social media accounts, theft of your games and in-app purchases, among other things!
Samsung Galaxy S10 Can Be Unlocked With Invalid Fingerprints
The new Samsung Galaxy S10 phone has a faulty fingerprint sensor that approves unregistered fingerprints (meaning a thief can unlock your phone, even if they don't have your prints). A software...
Blockchain And The Right To Be Forgotten
Blockchain has been making waves in the media and at the table in many companies for its ability to offer immutability and tamper evidence, reduced data corruption, enhanced security, among other...
Encrypt Your USB Drive And Protect Your Data
Identity thieves and other kinds of cybercriminals can dig up personal information such as passwords, emails, and communications to help them gather details required to take out credit in their victims'...