What is fake news and how do you spot it
The modern day disinformation epidemic is not the first chapter in the dissemination of made-up facts. The so-called age of post-truth existed long before misinformation became known as fake news. But today that term has become an integral part of global political warfare. It can affect elections
What is a password manager and how does it make you safer?
A lot of us tend to start our day by logging into our email, social media accounts or the Spotify playlist. For some, that means too many username and password combinations to remember. Many of us simply resort to using the same weak password on multiple websites in order to avoid the headache of fo
What is end-to-end encryption?
It's a protocol that encrypts information traveling between two points, for instance, between two users texting. Every embarrassing thing you do online, every site you visit and every word you type can be seen or stored by a third party. The modern internet is an eavesdropping paradise and an
What is encryption software?
It's a tool to keep your stored data safe from prying eyes. Confidence in the internet is on the decline. Our privacy and personal data are at constant risk of falling into the hands of online snoopers who are often acting on behalf of corporations and security agencies. This is especially conce
Are they taking our jobs? AI statistics for 2020
Artificial intelligence, or AI for short, has always seemed scary. We all remember that famous line uttered by HAL 9000 in 2001: A Space Odyssey - “I’m afraid I can’t let you do that, Dave.” Or, even worse, the machine uprising from the Terminator movies. As much as we hope the future will b
30 million credit cards leaked in the biggest Wawa breach to date
Credit card details of over 30 million Americans are being sold on the dark web following a massive data breach at convenience chain store Wawa. Gemini Advisory, a New York-based fraud intelligence firm, revealed that the data was being uploaded to the Joker’s Stash site. The dump has bee
Antivirus software vendors to continue supporting Windows 7
The beloved Windows 7 might have reached its end of life date, but all major antivirus companies confirmed that they will continue supporting the operating system for at least two more years. Earlier this month, Microsoft announced that it was ending extended support for customers still using Win
Firefox and Chrome remove thousands of malicious browser extensions
Both Mozilla and Google are stepping efforts to clampdown on web browser extensions that steal data, execute malicious code and perform other harmful actions. For its part, Google disabled all extensions with a monetary component, including those that are paid-for, offer in-browser transactio
Russian hacker pleads guilty to running a black market website
A 29-year-old Russian national accused of running an online criminal marketplace devoted to credit card fraud and other cybercrimes pleaded guilty last week. According to the US Attorney’s Office for the Eastern District of Virginia, Aleksei Burkov was charged with conspiring to commit comput
Shlayer trojan now spreading through YouTube and Wikipedia
The adware-dropping Shlayer Trojan accounted for nearly 30% of all attacks on macOS devices throughout last year. Researchers at Kaspersky Labs identified Shlayer as the most common threat to target its macOS userbase over the course of the last two years. The security firm said that one in ten
Gaming statistics: from the depths of Spacewar to the peaks of Fortnite
The creators of the first known video game to be played at multiple computer installations had no idea they had become pioneers in one of the biggest industries of the 21st century. The year was 1962, and the MIT students created Spacewar! Fast-forward several decades later, and video games are on a
Microsoft’s customer service database leaked online
Microsoft exposed nearly 250 million customer records, spanning 14 years, by making the data accessible to anyone with a web browser. Comparitech researchers discovered the massive batch of exposed data that contained customer support logs and other sensitive information, which could have been