Filter Posts
Interactive movies let you decide the plot—and they’re going mainstream
Combining elements of both movies and games, interactive movies let audiences control some parts of the story!
Cybersecurity lessons: Privilege escalation via file read/write
How a highly privileged process interacting with a lower-privilege user space can lead to attackers elevating their access or a DoS attack.
7 breaches, hacks, and leaks you might have missed this year
Hundreds of millions of people, including nearly the entire country of Brazil, have had their data stolen by hackers this year.
How to spot common red flags in phishing emails
Protect yourself by learning to recognize the most obvious signs that someone is trying to scam you with a phishing email.
How to know if your phone has a virus
From the presence of strange apps to sudden increases in data usage, learn to recognise the signs of an infected smartphone.
Cybersecurity lessons: A PATH vulnerability in Windows
Our cybersecurity experts discuss the PATH environment variable and the security implications of having it misconfigured.
2.4 vs. 5 GHz Wi-Fi: Are you using the right one?
Most routers offer both 2.4 and 5 GHz frequency bands. Which one you should use depends on the coverage area and speed you need.
The internet is safer now—but a VPN is still essential protection
The internet is a far more encrypted place than it was 10 years ago, but privacy and security experts still recommend a VPN for most users.
Guide: Protect your privacy at the workplace
Employer monitoring increased with the emergence of Covid-19, and it’s likely here to stay. Here are tips to maintain some of your personal privacy.
Eye in the sky: The history of the spy plane
It’s a bird! It’s a plane! Yes, it's a spy plane! From espionage balloons to blimps and drones, we take a (bird's eye) look at the history of the spy plane.