The USA’s NSA now has a podcast called “No Such Podcast”
Quite an apt title, and I’m sure no secrets are going to be exposed, apart from those already that have leaked out. But interesting to see some PR from the agency. They state this about […]
Quite an apt title, and I’m sure no secrets are going to be exposed, apart from those already that have leaked out. But interesting to see some PR from the agency. They state this about […]
Privacy is not about protecting criminals. It is a default that all folks should be able to enjoy, just the same as having the freedom to walk down any public road (well OK, pavement or […]
South African hacker Haroon Meer founded Thinkst Applied Research, which revolutionised network intrusion detection with its Canary honeypot tools. On 31 May 2015, they officially launched Canary, after working on it for about a year. […]
We use passwords every day to access everything from our social media profiles to our bank accounts — and if you are following good password hygiene rules, you have a lot of complex, unique logins […]
One of the stand-out features is ‘Discreet Icon,’ a new setting allowing users to disguise the Proton VPN app icon and make it appear as a weather, notes, or calculator app. In countries governed by […]
If you really want to get deep into the details of digital security, read the four-volume Digital Identity Guidelines from the National Institute of Standards and Technology (NIST). It’s a massive document, and much of […]
Cybercriminals have stolen at least R300 million from South African taxpayers over the past ten years thanks to security flaws at the Department of Public Works and Infrastructure. I am just dumbstruck over this, and […]
GPG keys are a vital part of verifying your online identity. As such, securing it from bad actors ensures that no one can impersonate you in your communications with other people. Most of us are […]
Token2 is a cybersecurity company specialized in the area of multifactor authentication. Founded by a team of researchers from the University of Geneva with years of experience in the field of strong security and multifactor […]
It’s understandable that people freaked out last week when photos deleted years ago had suddenly reappeared in their iPhone photo library. While we wait to hear the reason, it does seem to appear that deleted […]