An investigative reporter at heart, I write about technology, security, and online privacy. I also write about health and fitness. firstname.lastname@example.org
Dark Patterns are designed to trick you (and they'r...
Algorithmic tattoo identification for law enforcement could have all sorts of scary consequences.
Our writer set out to make a list of reliable VPNs; turns out the task is complicated.
A security vulnerability in the Mac version of Apple’s Messages app allowed users to be compromised by malicious links.
A round up of the mostly free and open source hacking tools used on the show.
The Colibri Center works with forensic scientists to help Central American families identify loved ones who died crossing the border.
Report: Government surveillance planes spotted over...
The app collects enough info to pinpoint user locations, though it says it doesn't use it.
The list of worst passwords used in 2015 includes longer passwords, but they're not exactly stronger.
If you're using LinkedIn for work, and dating apps for play, and never the twain shall meet... you may need to take these precautions to keep it that way.
Email applications that say they’re strong enough to foil government snoops and advertisers too often have chinks in their armor