(in)Secure

Cyber security has rapidly evolved from a minor concern to a serious problem. Breaches routinely expose our personal data, making it hard to know what and who we can trust. Even governments are frequently victims, and perpetrators, of major hacks.

The news breaks so quickly that it’s almost impossible to keep track of it all. (in)Secure, a weekly column, follows the trends, and screw-ups, you need to know about. We’ll touch on topics ranging from the laws behind cyber security, to the latest major breaches, to new methods that can help keep your data safe or, at least, minimize the damage.

Recent Stories
Computing

Apple’s unsafe Mac App Store is simply inexcusable

Multiple reports have indicated top apps in the Mac App Store have been stealing sensitive data right. Not only did Apple fail to properly vet them, it ignored warnings from security researchers for weeks. Is a safe app store too much to…
Computing

Faxploitation: Hackers can use old-school printers to invade your home network

You likely don’t give much thought to printers and fax machines. But a group of researchers recently showed hackers can fax their way into a network and make it out with whatever data they wanted.
Computing

Garbage to gold: How Yahoo unethically sells your spam email

Think you’re safe from Yahoo’s unethical data mining practices because it’s not your primary email account? As it turns out, Yahoo knows you use it for spam -- and it's turning a quick buck on your junk mail anyways.
Computing

What does that high score cost you? Why one in five gamers falls victim to fraud

Financial fraud is a problem for many industries, but as micro-transactions become more commonplace in gaming, fraud is proving problematic for developers and gamers alike.
Computing

Is your PC safe? Foreshadow is the security flaw Intel should have predicted

Three new processor vulnerabilities have appeared under the 'Foreshadow' banner. They're similar in nature to Meltdown and Spectre, only they steal data from different memory spaces. Here's everything you need to know.
Computing

Just when you thought spam was dead, it’s back and worse than ever

Spam emails might seem like an outdated way to spread malware, but in 2018 they are proving to be the most effective attack vector thanks to new techniques and tricks.
Computing

How A.I. can defeat malware that doesn’t even exist yet

Cylance Smart Antivirus is a brand new consumer protection application that claims to only need its AI machine learning algorithm to protect you. Can ditching signatures really make for a safer future?
Computing

Pay-n-pray cybersecurity isn’t working. What if we just paid when it works?

Companies and individuals sink loads of money into cybersecurity each year, and yet with each passing month, the situation seems to worsen. Area 1 Security has a new philosophy -- and it could totally change the game.
Computing

Facebook wants to own your face. Here’s why that’s a privacy disaster

(in)Secure is a weekly column that dives into the rapidly escalating topic of cybersecurity. Scanning your face is easier than remembering a password, that’s for sure. But while facial recognition technology has gone mainstream with…
Computing

People are reading your email. Here’s how to make them stop

The contents of your email are no private, at least not to third party applications that connect to Gmail. That should be enough to worry most people. Here's how to know exactly who is reading your email and how to turn them away.
Computing

After 14 years, a new generation of Wi-Fi security is coming. Here’s what to know

Wireless security rarely gets as big an upgrade as WPA3 will bring about. As new hardware begins to support it, we should see much better password protections for all Wi-Fi users whether at home or in public.
Computing

Improving security means killing the password, but that battle has just begun

Although password use is in decline, switching to biometrics or machine-learning algorithms may not be enough to fix our digital security woes. We need to change the way we store login credentials, as well.
Computing

Why Mastercard is ripping a page from Bitcoin’s book

Mastercard's new blockchain patent seeks to put an end to credit card skimmers and make money safer. Regardless of what you think of cryptocurrency, the largest financial institutions are transforming real money to become more like it every…
Computing

Apple’s new privacy features are bad for Facebook, but great for everyone else

Apple announced several new privacy and cybersecurity features at WWDC 2018, specifically in its web browser, Safari. The company didn’t shy away from naming why it made the changes. It had Facebook right in its crosshairs.
Computing

Duck, cover, and reboot your router? Why the FBI’s new warning is no joke

The FBI has discovered up to 500,000 home or office routers could be vulnerable to a dangerous cyberattack. It sounds like an easy solution, but can resetting a router really stop a major cyberattack?
Computing

IBM banned USB drives. Is it the future of security or a knee-jerk reaction?

Banning USB devices might go some way to preventing data loss and leaks, but to some, it doesn't get to the heart of the problem of truly securing data and the networks its stored on.
Computing

You’ll never read Facebook’s new data policy, so we did it for you

You’re never going to read Facebook’s new data policy, so we did it for you. Not much has changed, but it reveals more information about how the social network tracks you across the internet.
Computing

Web trackers aren’t just spying on you; they’re slowing you down

Trackers might be found within the inner workings of most modern websites, but their impact could be far broader than just privacy invasions. They might be actively slowly down the internet as we know it.