identity fraud

How identity fraudsters operate

A notorious cyberthief turned security consultant walks us through the “synthetic identity fraud” process, from searching the Dark Web to pulling credit reports to opening accounts.
bias in AI

Beware the dangers of bias in AI

While others fear sentient robots eradicating humanity, there’s a much more urgent and imminent concern about how algorithmic and data bias can threaten society, Emily Crose argues.

5 Twitter do’s and don’ts

From verifying link destinations to being cautious about what you share, social-media privacy expert Hayley Kaplan outlines how to safely use President Trump’s favorite pulpit.
secure apps

10 secure apps to try in 2017

Making a new year’s resolution to clean up your digital-security act? Here are 10 secure apps to consider, from ad blockers and password managers to private browsers and secure messaging apps.