Josh Lake is a writer who focuses on the intersections between technology, privacy and security. His work helps companies and individuals get the most out of technological developments, without having to sacrifice their civil liberties or open themselves up to the ever-increasing threats of cybercrime.
It's no secret that your mobile tracks you. A lot. We explain everything you need to know about how your mobile tracks you and how you can reduce this as much as possible.
Warrant canaries were once all the rage, but we hear about them less and less now. Are they still useful? How are the newer transparency reports different?
Advanced persistent threats (APTs) are the most complex cyberattacks. They are generally mounted by groups linked to nation-states and target highly valuable systems and data. We explain what APTs are and how to defend against them.
The domain name system is complex, which leaves it open to a range of DNS attacks. Find out what the different types of DNS attacks are and how to defend against them.