Log4Shell is the latest hacker exploit rocking the internet, and it’s arguably the worst yet. The vulnerability is in an obscure piece of software used on millions of computers.
Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
The government uses a process called public procurement. A professor of public policy explains how the process works and how it is increasingly used to achieve social goals.
The internet has created new threats to national security and population welfare. The Canadian government needs an oversight department to address cybersecurity and educate their citizens.
The COVID-19 pandemic has meant an increased dependence on digital technologies. However, this comes with a serious threat to our personal privacy and property.
Switching web service providers and providing almost $40 million from the federal budget means the census 2021 website should be safe from crashing at the crucial time this evening.
A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware works.
Parties who design the technologies and platforms on which mobile apps are built and marketed must be brought within the legal accountability framework to close the privacy loop.
It’s reported the Pegasus spyware can capture a user’s keystrokes, intercept communications, track their device and tap into their camera and microphone.