Ray has been covering tech and cybersecurity for over 15 years. His work has appeared on TechRepublic, VentureBeat, Forbes, Entrepreneur, and the Microsoft Blog, among others.
Our quest to understand the remote work security landscape starts with the story of an employee. For the sake of this story, we will say he is a man, and we will call...
Apple defines malware as “malicious software, which includes viruses, worms, trojan horses, and other programs that can harm your Mac or your privacy.” And while experts still do not agree on the exact quantity...
If there is anything cybersecurity experts can agree on, it’s that 2023 has been a wild rollercoaster ride so far. Undoubtedly, the modern threat landscape is leveling up and becoming more sophisticated every...
You go online and find the new ChatGPT AI bot. After chatting with it for a while, you have shared all kinds of personal information. Perhaps you mentioned your name, the names of...
It’s been over a year since Russia’s invasion of Ukraine began. Cities have been devastated, international sanctions applied, hundreds of thousands of fighters and civilians on both sides killed or injured, and millions...
May 25 marks the fifth anniversary of the General Data Protection Regulation (GDPR). The law was adopted in the EU in the aftermath of the Cambridge Analytica scandal. Cambridge Analytica shocked the world...
Our digital world runs on data. And data needs to be constantly formatted, verified, and secured. Every day, your data is encoded, encrypted, or hashed when you go online to write an email,...
Ever had the feeling that you’re being watched when you’re using your laptop? Or do you worry when the webcam light flickers? A camera lens, even a small one, always open and staring...
When most people hear the word “hacker,” they often think of the usual stereotype: an evil cybercriminal in a hoodie, hunched over a computer in a dark room. In a way, we have...
Not all skills used by hackers and cybercriminals relate to computing. In fact, when coding gets a hacker nowhere, they turn to a classic technique used by scammers and con artists: social engineering....