Digital security


769 articles

Fingerprints all over: Can browser fingerprinting increase website security?

Fingerprints all over: Can browser fingerprinting increase website security?

Fingerprints all over: Can browser fingerprinting increase website security?

Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing personal information with more general data. But is it a valid promise?

Márk Szabó03 Aug 2023


Quantum computing: Will it break crypto security within a few years?

Quantum computing: Will it break crypto security within a few years?

Quantum computing: Will it break crypto security within a few years?

Current cryptographic security methods watch out - quantum computing is coming for your lunch.

Cameron Camp01 Aug 2023


Gathering dust and data: How robotic vacuums can spy on you

Gathering dust and data: How robotic vacuums can spy on you

Gathering dust and data: How robotic vacuums can spy on you

Mitigate the risk of data leaks with a careful review of the product and the proper settings.

Roman Cuprik26 Jul 2023


Passwords out, passkeys in: are you ready to make the switch?

Passwords out, passkeys in: are you ready to make the switch?

Passwords out, passkeys in: are you ready to make the switch?

With passkeys poised for prime time, passwords seem passé. What are the main benefits of ditching one in favor of the other?

Phil Muncaster20 Jun 2023


Digital security for the self-employed: Staying safe without an IT team to help

Digital security for the self-employed: Staying safe without an IT team to help

Digital security for the self-employed: Staying safe without an IT team to help

Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business

Phil Muncaster24 May 2023


Top 5 search engines for internet-connected devices and services

Top 5 search engines for internet-connected devices and services

Top 5 search engines for internet-connected devices and services

A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet

Camilo Gutiérrez Amaya18 May 2023


Meet “AI”, your new colleague: Could it expose your company's secrets?

Meet “AI”, your new colleague: Could it expose your company's secrets?

Meet “AI”, your new colleague: Could it expose your company's secrets?

Before rushing to embrace the LLM-powered hire, make sure your organization has safeguards in place to avoid putting its business and customer data at risk

Roman Cuprik17 May 2023


You may not care where you download software from, but malware does

You may not care where you download software from, but malware does

You may not care where you download software from, but malware does

Why do people still download files from sketchy places and get compromised as a result?

Aryeh Goretsky16 May 2023


Creating strong, yet user-friendly passwords: Tips for your business password policy

Creating strong, yet user-friendly passwords: Tips for your business password policy

Creating strong, yet user-friendly passwords: Tips for your business password policy

Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization

Roman Cuprik04 May 2023