Write a story
Sign in / Sign up
Handpicked by Medium Staff
Towards a more perfect password.
The Equifax hack and how to protect your family — all explained in 5 minutes
In 1989, the US government decided to concentrate our most sensitive data in the hands of three giant finance corporations: Experian…
How To Protect Yourself From The Equifax Hack
Equifax, one of the nation’s three major credit reporting agencies, has reported a massive hack potentially exposing the sensitive personal…
Should You Believe the Rumors About Kaspersky Lab?
Is Russian software company Kaspersky Lab colluding with the FSB? Stealing private information? Rumors abound, without any hard evidence to…
Medium members only
Where are the flaws in two-factor authentication?
One of the main tools for keeping hackers at bay offers no guarantee of security
In case you missed it
The Service Provider Paradox
Fraud and identity theft have become big topics of concern, especially when it relates to the relationship between users and service…
Poking Holes in Cargo Cult Journalist Security
If journalists go through the motions, is it still security?
Medium members only
The Equifax Security Breach
How to Protect Yourself After 143 Million Accounts Were Hacked
How Blockchain will Immunize Your Business against Cyber Attacks
Corporate environment is highly vulnerable to cyber attacks. As per Vormetric’s 2015 Insider Threat Report, 93% of U.S. Organizations were…
Quantum leap: What will quantum computing mean for encryption?
As further advances are made in the area of quantum computing, John-Paul Power ponders how developments in this area will impact encryption…
The FCC.gov Website Lets You Upload Malware Using Its Own Public API Key
Somewhat incredibly I am the first tech writer on the planet to break this story, but even more incredible is the fact that the FCC lets…
Machine Learning is Fun Part 8: How to Intentionally Trick Neural Networks
A Look into the Future of Hacking
International collaboration on cybersecurity is possible. Here’s how it can be done.
Adapted from Sustaining Progress in International Negotiations on Cybersecurity by James Andrew Lewis.
Dive deeper with these tags
Brain Power: Using The Neuromorphic Data Microscope for Cybersecurity Analysis
This piece of mine was originally published on CCSI’s blog.
Demystifying the Signal Protocol for End-to-End Encryption (E2EE)
Many people merrily go about their life without worrying at all about encryption. Posting photos on Facebook and Instagram, Snapchat, and…
Are trackers the new backbone of the Web?
You don’t need cash to search Google or to use Facebook, but they’re not free. We pay for these services with our attention and with our…
The Marcus Hutchins I knew
To be completely honest, I didn’t know him as Marcus Hutchins at the time. I knew him only by his IRC and forum nick, Touchme.
Starting the Avalanche
Application DDoS In Microservice Architectures
Netflix Technology Blog
Retiring the Green Padlock
The infamous padlock in the URL bar of browsers has, for over a decade, been the tell-tale sign of a secure connection to a website…
What are VPNs — and why would I use one?
As people’s privacy concerns grow, VPNs have become more popular. But what are they? And should you be using one?
Why cyberattacks could be war crimes
Patrick Lin, Director, Ethics and Emerging Sciences Group, California Polytechnic State University (Cal Poly)
World Economic Forum
Stumbling across a scam & a system inadequate to fight cybercrime
Note: some of the finer details of this story have been withheld as this is an ongoing crime, and I don’t want to lead anyone else to the…
Jozef Maxted 👻
Encryption At The Centre Of Mass Arrests: One Year On From Turkey’s Failed Coup
This piece was written by PI Policy Officer Lucy Purdon.
An In-Depth Guide to Personal Cybersecurity
A guided tour inside my digital security practices
Surviving the IoT Cyber Attack Pandemic
“The Internet of Things is turning into a security nightmare.”
There is No More Encryption Debate: Backdoors Threaten the Whole World
The encryption debate ends now. As a society we simply can’t allow backdoors in encryption. Anyone who tells you otherwise has absolutely…