-
What is cybertorture? How our minds are vulnerable to online experiences
What will change if we are forced to move our social circle to virtual lands, browse the web anonymously, and stay permanently at home? Will there still be any crime? Will nations still exist, and wil...
-
What is cybercrime? 5 types and examples of cybercrime explained
Think about large-scale heists and it’s normal to conjure an image of a group of thieves robbing a bank, whisking away cash in black duffel bags. While such crimes haven’t gone away, criminals in ...
-
How to secure your video-conferencing apps
This post was originally published on May 14, 2020. If you are working from home right now, chances are you are relying heavily on at least one video-conferencing app to conduct all your previously in...
-
What is internet privacy and how should you protect your online privacy?
We use the internet for just about everything in our personal and private lives—and what we do online has become valuable data. Large corporations want to track our activity so they can serve us wit...
-
What is malware? How viruses, trojans, and ransomware work
Malware, or "malicious software," is a term for a variety of viruses, spyware, or ransomware (cryptolockers) that cause harm to a user, their data, or devices. The term malware implies malicious inten...
-
-
-
-
Here's how bug bounties improve security
Software could be the most complex tool created by humans. While it might still be possible for a single individual to understand all the functioning parts of a car or telephone, it’s unlikely any o...
-
Deep web vs. dark web: What's the difference?
The difference between deep web and dark web, in short: Deep web: The part of the internet not indexed by search engines. Includes content like personal email accounts, private databases, and subscri...
Tips & tricks
