News

A recent Kaspersky survey entitled “Cybersecurity in the workplace: Employee knowledge and behaviour”, showed that professionals surveyed in South Africa, use multiple devices for work: along with a ...
The potential harms of weakening encryption are not hypothetical: They are real, and they are gendered. The reality that ...
Almost everyone has experienced fumbling for keys in the dark, misplacing a set right before leaving the house, or worrying about who might have a copy. Traditional keys come with real drawbacks. They ...
Bitchat, a brand new decentralised chat app, played a key role in Nepal's Gen Z-led protests by enabling secure, offline communication amid internet blackouts and social media bans. It allowed ...
Spokeo reports on smart home facial recognition technology, enhancing convenience but raising privacy concerns; adoption ...
Academic researchers have introduced a high-speed version of the Cloud Pailier scheme (paywall) —an encryption model that ...
Google's strongest security features are tucked behind a single toggle. Turn it on to protect yourself from theft, scams, spam, and more.
Regulatory requirements such as the EU’s Digital Operational Resilience Act (DORA) underscore the need for financial institutions to improve their resilience to very real threats such as cyberattacks, ...
X is now offering end-to-end encryption messaging for all of its users. Here’s what you need to know about it.
Signal users will soon be able to save end-to-end encrypted backups of their chat history in a secure archive, making it ...
In theory, quantum physics can bypass the hard mathematical problems at the root of modern encryption. A new proof shows how.
Take these preemptive steps to protect your data and make your laptop more recoverable in case it's ever lost or stolen.