5 ways cybercriminals can try to extort you

When it comes to coercing people into parting with their money, cybercriminals seem to have an endless bag of tricks to choose from. There...

Deadly Ransomware Story Continues to Unfold

A ransomware attack with fatal consequences is attracting notice and comment from around the world.This is a follow-up to yesterday's story breaking the...

Biggest tech IPOs of 2020

The 2019 calendar year will long be remembered in the eyes of public market watchers as the year of WeWork. Once billed as...

The NVIDIA-Arm merger could change how we work

If the merger between Arm and NVIDIA is approved (I expect Great Britain, the EU, and China will have reservations), the result could...

A Hacker’s Playlist

Nine security researchers share their favorite songs and genres. What sound do you hear in your head when you think "stereotypical hacker music"? For most...

Mozilla tightens belt, folds two Firefox services

A year and a half after launching the free file-sharing service Firefox Send, Mozilla canned the concept, part of a retrenchment that began...

Deepfake Detection Poses Problematic Technology Race

Experts hold out little hope for a robust technical solution in the long term.With disinformation concerns increasing as the US presidential election approaches,...

Apple upgrades Safari on Catalina and Mojave in annual exercise

Apple on Wednesday upgraded Safari for Mac owners running macOS Catalina or macOS Mojave, giving those users a new browser before releasing the...

Recent Posts