Security & Privacy Tutorials & How-Tos

tor_messenger_is_shutting_down_and_it_didnt_even_leave_beta
Posted by Alex Lee on April 3, 2018

Tor Messenger is shutting down, and it didn’t even leave beta

a_tamper-proof_bitcoin_wallet_was_hacked_by_a_british_15-year-old
Posted by Alan Martin on March 22, 2018

A tamper-proof Bitcoin wallet was hacked by a British 15-year-old

KeepSafe VPN for women
Posted by Victoria Woollaston on March 16, 2018

We can’t tell if this “VPN for women” is a joke, or just insulting

slingshot
Posted by Edward Munn on March 12, 2018

“Slingshot” router malware that went undetected for six years is one of the most advanced attacks ever seen

what_is_fog_computing
Posted by Nicole Kobie on March 7, 2018

What is fog computing?

private_browsing_isnt_private_but_mit_researchers_have_an_answer_-_1
Posted by Alan Martin on February 26, 2018

Private browsing isn’t that private after all, but MIT researchers have an answer

encrypted_chat_app_signal_gets_a_cash_injection_from_whatsapp_co-founding_billionaire_brian_acton
Posted by Alan Martin on February 22, 2018

Encrypted chat app Signal gets a cash injection from WhatsApp co-founding billionaire, Brian Acton

Windows 10 release date - Technical Preview 10122 Microsoft Edge browser thumb
Posted by Lee Bell on February 20, 2018

Google’s Project Zero discloses Edge browser bug after Microsoft didn’t fix it in time

android-crypto-mining
Posted by Edward Munn on February 16, 2018

Hackers are using Google Play Store apps to secretly mine cryptocurrency on your Android phone

the_fbi_cia_and_nsa_are_suspicious_of_huawei_and_zte_but_its_not_obvious_why_2
Posted by Alan Martin on February 15, 2018

Don’t trust phones from Huawei and ZTE, the FBI warns – without seemingly any real evidence or reason

facebook_vpn_-_onavo_protect
Posted by Vaughn Highfield on February 13, 2018

Privacy advocates are in a spin over Facebook’s Onavo Protect VPN tracking your data – but what did they expect?

bitcoin_mining
Posted by Vaughn Highfield on February 12, 2018

Government websites hit by bitcoin-mining hackers

gagging_order_online_surveillance
Posted by Stewart Mitchell on February 8, 2018

Gagging orders: The internet surveillance nobody can talk about

this_open_source_echo_rival_respects_your_privacy_and_doesnt_want_to_sell_you_anything_-_1
Posted by Alan Martin on February 6, 2018

This open-source Echo rival respects your privacy and doesn’t want to sell you anything

logotagline
Posted by Lee Bell on February 2, 2018

Firefox users urged to update their browsers immediately due to critical security flaw

micius_satellite_quantum
Posted by Thomas McMullan on January 31, 2018

A Chinese satellite just used quantum cryptography to make an unhackable video call between Beijing and Vienna

youtube_cryptocurrency_mining_-_cpu_fans
Posted by Vaughn Highfield on January 29, 2018

Malicious YouTube ads have been using your CPU power to mine cryptocurrency

strava_military_map_leak
Posted by Vaughn Highfield on January 29, 2018

Strava is a military security nightmare as US base locations are leaked by fitness fanatics

ba-facial-recognition
Posted by Edward Munn on January 26, 2018

British Airways is rolling out its biometric gates to more US airports

oneplus_5t_white_logo_0
Posted by Vaughn Highfield on January 19, 2018

OnePlus hacked as customers are warned of a serious breach

dark_caracal
Posted by Edward Munn on January 19, 2018

“Dark Caracal” operation blamed for the hacking of thousands of victims in 21 countries

skygofree_trojan
Posted by Edward Munn on January 17, 2018

“Skygofree” trojan can intercept your WhatsApp messages

Code breaking puzzles and GCHQ contest
Posted by Victoria Woollaston on January 16, 2018

Can you crack these GCHQ challenges? Brain teasers released to launch CyberFirst Girls contest

htc_vive-vaughn_highfield-face_on
Posted by Thomas McMullan on January 15, 2018

Adult VR app SinVR exposed names and emails of thousands of users

researchers_trick_speech-to-text_systems_with_hidden_messages_-_could_alexa_bixby_google_and_cortana_be_next
Posted by Alan Martin on January 11, 2018

Researchers trick speech-to-text systems with hidden messages – Could Alexa, Bixby, Google, Siri and Cortana be next?

amazon-echo-privacy
Posted by Alex Lee on January 4, 2018

“Alexa, I’d like to report a crime”: Your Amazon Echo could soon be used to

Apple chip
Posted by Victoria Woollaston on January 4, 2018

Apple rolls out more Meltdown and Spectre fixes as the Linux founder calls Intel’s patches “utter garbage”

n_korea_cryptocurrency
Posted by Edward Munn on January 2, 2018

North Korea is hijacking computers to mine cryptocurrency

eu_referendum_dirty_tricks
Posted by Alan Martin on December 14, 2017

No, 73p of Russian Facebook spending wouldn’t shift a Brexit vote, but it’s dangerous to take that at face value

android_keyboard_hack
Posted by Vaughn Highfield on December 6, 2017

31 million Android users’ personal data exposed thanks to an insecure keyboard app

High Sierra MacOS flaw
Posted by Victoria Woollaston on November 29, 2017

Apple rolls out fix for the security flaw that let ANYONE log in to a High Sierra Mac

google_mast_tracking
Posted by Edward Munn on November 23, 2017

Google admits to tracking users’ locations

Net Neutrality UK
Posted by Edward Munn on November 21, 2017

What is net neutrality and what does it mean for the UK?

intel_cars
Posted by Adam Shepherd on November 21, 2017

Intel security flaws put laptops, servers and storage at risk of hacking

400_keyloggers_keystrokes
Posted by Vaughn Highfield on November 21, 2017

How to stop over 400 sites logging everything you type: A complete list of every site using session replay scripts

cash_converters_hit_by_uk_data_breach_ransom_demand_-_2
Posted by Alan Martin on November 16, 2017

Cash Converters hit by UK data breach ransom demand

01-smartphone-netflix
Posted by Thomas McMullan on November 8, 2017

There’s a particularly nasty Netflix email scam doing the rounds claiming your account has been suspended

hacking
Posted by Sponsored on October 24, 2017

The white hat brigade

mobile-phone-connecting-cloud-storage
Posted by Sponsored on October 23, 2017

How to stay safe in the cloud

ransomware-2320941_1920
Posted by Adam Shepherd on October 16, 2017

“If your device supports Wi-Fi, it is most likely affected:” The full scale of the WPA2 flaw is revealed

us_department_of_justice_echoes_amber_rudds_views_on_encryption_2
Posted by Alex Lee on October 11, 2017

US Department of Justice echoes Amber Rudd’s views on encryption

apple_app_store_phishing
Posted by Thomas McMullan on October 11, 2017

Hack reveals how criminals could steal your Apple ID using dodgy pop-ups

pure_vpn
Posted by Abigail Beall on October 10, 2017

The FBI has used records from VPN provider that claims not to keep logs

nsa_hack
Posted by Jane McCallion on October 6, 2017

US security secrets reportedly stolen in Russian NSA hack

amber_rudd_encryption
Posted by Alan Martin on October 3, 2017

Amber Rudd: “I don’t need to understand how encryption works to understand how it’s helping the criminals”

Malware
Posted by Sponsored on October 2, 2017

The business of malware

Roaming Mantis malware
Posted by Sponsored on October 2, 2017

The 10 best (or should that be worst?) malware attacks

facebook_will_now_advertise_based_on_shops_you_visit_
Posted by Abigail Beall on September 22, 2017

Facebook will now track what shops you visit offline to target you with ads online

cyber_attack
Posted by Thomas McMullan on September 21, 2017

Prepare for major cyber-attack, warns National Cyber Security Centre

hacker-1944688_960_720
Posted by Abigail Beall on September 18, 2017

Hackers spread hidden malware to 2.27 million people through the CCleaner software