Menu Close

Articles on Digital security

Displaying all articles

NFTs can be used to prove who created and who owns digital items like these images by the artist Beeple shown at an exhibition in Beijing. Nicolas Asfouri/AFP via Getty Images

How nonfungible tokens work and where they get their value – a cryptocurrency expert explains NFTs

NFTs are made the same way as crypto coins, but where every crypto coin is like every other, each NFT is a unique digital item – from images to sound files to text.
Shutterstock

Can I still be hacked with 2FA enabled?

Two-factor authentication is certainly an added layer of security as we traverse the online world. But it comes in various forms, and they’re not all equally protective.
Even though passcode options include swipe patterns and long passwords, many users still use easy 4-digit PINs. This is because people are often lulled into a false sense of security when they use fingerprint login. SHUTTERSTOCK

Fingerprint login should be a secure defence for our data, but most of us don’t use it properly

While the data from a fingerprint is very hard to retrieve, cybercriminals can get around biometric technology in various ways. And having a weak passcode is like giving them a hall pass.
Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017. (Yun Dong-jin/Yonhap via AP)

Ransomware like Bad Rabbit is big business

Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.

Top contributors

More