The math of threes is surprisingly powerful.
MicroStockHub/iStock via Getty Images
A mathematician explains how language can keep your online accounts safe and pinpoint your location on the planet.
The depths of the valleys on a key act like a code that must match the lock.
Robin Smith/The Image Bank via Getty Images
A computer security expert explains how keys work – and how they are like passwords.
Regular Americans could find themselves targets of Russian cyberwarfare.
Roberto Westbrook via Getty Images
Russia’s cyberattack capabilities can be applied to US targets, including regular Americans’ homes and businesses.
It’s time to think differently about how we address the password problem.
Start 2022 by improving your password hygiene. Ideally you can use a password manager, but at the very least make sure your financial, social and work accounts each has their own strong, unique login.
Chances are some of your data has already been stolen, but that doesn’t mean you should shrug data breaches off.
WhataWin/iStock via Getty Images
Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
Creating and managing strong passwords is easier said than done. But it’s worth doing to protect your security online.
Many still make their passwords too simple.
Passwords have been around for decades and we’re still getting it wrong.
One website dedicated to tracking stolen passwords suggests there are details of currently more than 10 billion compromised accounts available online.
Two-factor authentication is certainly an added layer of security as we traverse the online world. But it comes in various forms, and they’re not all equally protective.
Face to face, virtually.
SammyVision/Moment via Getty Images
Zoom’s privacy and security shortcomings are just the latest videoconferencing vulnerabilities. Knowing each platform’s risks can help people avoid many of the downsides of virtual gatherings.
Even though passcode options include swipe patterns and long passwords, many users still use easy 4-digit PINs. This is because people are often lulled into a false sense of security when they use fingerprint login.
While the data from a fingerprint is very hard to retrieve, cybercriminals can get around biometric technology in various ways. And having a weak passcode is like giving them a hall pass.
This SDS Sigma 7 computer sent the first message over the predecessor of the internet in 1969.
Andrew 'FastLizard4' Adams/Wikimedia Commons
The first internet communication was underwhelming, thanks to a computer crash. But a lot has happened since then – including key decisions that helped build the internet of today.
More than ten years since blockchains were developed, their usefulness is only just being discovered.
As police face greater obstacles with encryption, courts are divided on whether compelling people to reveal their passwords is legal.
In a recent Canadian court case, defence and prosecution argued over whether a suspect was required to provide his password to allow for a search warrant to be executed on his phone.
Canadian CEO Gerald Cotten died in December, taking to his grave the passwords to unlock his cryptocurrency clients’ millions.
The CEO of a Canadian cryptocurrency company died recently, and took his passwords with him, leaving his clients high and dry. The debacle illustrates again that cryptocurrencies should be regulated.
Many people don’t want to let go of how they create passwords.
When it comes to picking a new password, people’s resistance to change can make them less secure online.
Prepare to protect yourself.
Think defensively about your online accounts and data security – and don’t assume you’ll avoid harm.
A sign marks the location of a Chicago Marriott. In November 2018 the hotel chain said their guest reservation database was hacked, compromising the security of up to 500 million customers.
The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.
What dangerous experiences lurk behind the use of this trackpad?
Protect yourself from hackers, trolls, bots, social media executives and programmers in need of ethics training.