Can you spot a hoax in the flood of news? Can your children?

Gone are the days of chain letters! Back then, all victims of fabricated falsehoods had to lose was time and possibly a few bucks for stamps. Compared to these old-school hoaxes, there’s much more at stake with their modern cousins – often designed well enough to manipulate their audience into doing something without even realizing it. … More Can you spot a hoax in the flood of news? Can your children?

How to start analyzing the security of your IoT devices

Nowadays, a lot of attacks take place by tricking the user in some way, such as to open a file, click on a malicious link, or enter their personal data into a fake website. But when it comes to the “Internet of Things” (IoT), the methods are a little different. In principle, this is partly because … More How to start analyzing the security of your IoT devices

Researchers unveil Veil to make ‘private browsing more private’

Researchers claim to have devised a way of browsing the web that “patches security holes left open by web browsers’ private-browsing functions”, reads the press announcement by the Massachusetts Institute of Technology (MIT). The newly-proposed method, aptly called ‘Veil’, may thus be of interest for web users who wish not to leave any trace of their browsing … More Researchers unveil Veil to make ‘private browsing more private’

Privacy by Design: Can you create a safe smart home?

The Internet of Things (IoT) is, for many, about devices we connect to a network for convenience, such as thermostats, light switches, connected cars and interactive toys for our kids. While the IoT is indeed a marvelous invention, designed to make daily digital life even easier, how safe is it in terms of protecting your privacy? Alongside … More Privacy by Design: Can you create a safe smart home?