Password storage as the cornerstone of security
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
5 articles
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
Scammers are interested in your photos with ID cards. We explain why and how to stay protected.
When it comes to online accounts, voicemail is a major security hole. Here’s why.
Photo files typically contain additional data on shooting conditions, including a geotag. What happens to this data when the photo is published online?