What are keyloggers, and how do they work?
They record every key you press. Can you protect yourself?
So your information is on the dark web. What now?
You can’t take it down. But here are the steps to take to protect your identity.
Why anonymous data isn’t as anonymous as you think
Discover how data de-anonymization, also known as data re-identification, can link anonymized data back to you.
4 ways to hide from drone surveillance
Commercial drones are common sights—but they might be watching you. Here are ways to hide from drones and avoid surveillance from above.
What are bots and how do they work?
More than half of all internet traffic is made up of bots. Some make our lives easier, while other have more malicious intention. Join us as we discover the difference.
How to spot and protect yourself against LinkedIn scams
LinkedIn is full of opportunities, yet not all of them end with you getting that dream job. Learn to identify and protect yourself against the five most common LinkedIn scams.