World War II information security: Navajo VPN
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable
255 articles
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable
Virtual Private Networks, or VPNs for short, have become increasingly essential of late as we more often access sensitive data from remote locations — and as the threat of having our
We examine how popular Canon printers could become a foothold for attackers within an organization’s network.
Researchers have discovered that 50% of data transmitted via satellites is unencrypted. This includes your mobile calls and texts, along with banking, military, government, and other sensitive information. How did this happen, and what can we do about it?
Kaspersky for Linux is now available to home users.
We explain what data DeepSeek collects, who it shares it with, how to configure the chatbot for maximum privacy, and how to install a local version.
The internet never forgets — and what kids post or share today can come back to hurt them, either right away or years down the line. Here’s how to shrink your child’s digital footprint without resorting to battles or bans.
Using anomalies in the behavior of users, devices, applications, and other entities to detect cyberthreats.
Why advanced attackers are interested in your home Wi-Fi access points, and how they maintain control over your devices.
This report delves into the cyberthreat landscape that has exploited Gen Z’s favorite streaming services, films, series and anime from Q2 2024 to Q1 2025, highlighting the related dangers and providing insights on how to protect yourself from these threats.
How the situation with ransomware attacks on companies has changed, and why paying a ransom has become an even worse and more useless idea in 2025.
Cybercriminals behind the Fog ransomware publish leaked data along with the IP addresses of attacked computers.
If you’ve ever downloaded game cheats from a YouTuber’s “link in the description”, your computer might be infected with a stealer.
Online converters are a tempting but dangerous way to change file formats. We tell you how to convert files and not get trojanized.
Our Android apps are no longer available on Google Play. We explain how to download, install, and update them by alternative means.
The best privacy-focused services that make practical gifts for friends and family.
Black Friday is a great opportunity for scammers to line their pockets — but not with your money if you follow our advice.
The Tor Browser is a bastion of online anonymity, yet even this tool can’t ensure complete privacy — and here’s why.
Where and why quantum-resistant cryptography has already been implemented, and what compatibility issues it caused.
Even in 2024, the world is rife with digital paranoia and superstition. Is my smartphone tracking me? Will incognito mode make me invisible? This post answers these and lots of other related questions.