Cyberbullying is the use of electronic communication to bully or harass someone, usually by sending mean, threatening, or inappropriate messages…
Read More →Identity theft is a serious concern when it comes to using the internet. Here are some steps you can take…
Read More →The bad news: the crooks have your SSH private keys. The good news: only users of the “nightly” build were…
Read More →Two-factor authentication (2FA) is a security process in which a user provides two different authentication factors to verify their identity.…
Read More →The problem with anniversaries is that there’s an almost infinite number of them every day……
Read More →Listen now – you’ll be alarmed, amused and educated, all in equal measure. (Full transcript in article.)…
Read More →Cryptographic agility: the ability and the willingness to change quickly when needed.…
Read More →Is there a special meaning of “don’t” that means “go right ahead”?…
Read More →If the crooks have connected up your phone number and your Twitter handle… what could go wrong?…
Read More →It’s serious, it’s critical, and you could call it severe… but in HHGttG terminology, it’s probably “mostly harmless”.…
Read More →