identity fraud

How identity fraudsters operate

A notorious cyberthief turned security consultant walks us through the “synthetic identity fraud” process, from searching the Dark Web to pulling credit reports to opening accounts.
bias in AI

Beware the dangers of bias in AI

While others fear sentient robots eradicating humanity, there’s a much more urgent and imminent concern about how algorithmic and data bias can threaten society, Emily Crose argues.

5 Twitter do’s and don’ts

From verifying link destinations to being cautious about what you share, social-media privacy expert Hayley Kaplan outlines how to safely use President Trump’s favorite pulpit.
secure apps

10 secure apps to try in 2017

Making a new year’s resolution to clean up your digital-security act? Here are 10 secure apps to consider, from ad blockers and password managers to private browsers and secure messaging apps.
holiday scams

5 holiday scams to avoid

Holiday chaos, combined with increases in online gift shopping and charitable giving, form a perfect storm for scammers to strike. From email scams to fake charities, here’s what to look out for.
Tumblr hack

How to recover from a Tumblr hack

The Yahoo microblogging service acknowledges that millions of its users’ account credentials have been compromised in recent years. Here’s how to regain control of and further secure yours.

Inside the malware name game

From publicity and hacker humiliation to machine-learning algorithms and taxonomy, we outline the factors leading to names such as Melissa, Stuxnet, Nimda, and Code Red.