Josh Lake is a writer who focuses on the intersections between technology, privacy and security. His work helps companies and individuals get the most out of technological developments, without having to sacrifice their civil liberties or open themselves up to the ever-increasing threats of cybercrime.
Federated learning is a new approach for training the algorithms we use every day. But what actually is federated learning and is it really more private? We explain everything you should know about this new algorithm model.
From sending fake invoices to manipulating employees into wiring them money, hackers have a wide range of business email compromise techniques that they use to defraud companies.
Remote wiping your laptop or PC, coupled with full disk encryption, is the best way to protect your data if a computer is lost or stolen. This article explains the advantages of both and how to do them.
Credential stuffing attacks are important to understand so you can keep your personal and business accounts safe. We explain how credential stuffing attacks work and how you can minimize the risk of attacks.
There are so many different messaging apps on offer, and the differences can be highly technical. Check out our guide for a simple rundown of which apps you should be using to keep your data secure and private.
Governments keep calling for tech companies to insert backdoors into their encrypted services. Find out what this actually means, and how these systems could damage global security.
Steganography is the study and practice of concealing communication. It plays a different role to cryptography, with its own unique applications and strengths.
The "anti-encryption laws" are a significant piece of legislation that could have worldwide security ramifications. Find out what they are and who they will affect in this comprehensive guide.
Electronic and internet voting can help improve our election systems in several different ways. Each of these concepts rely on cryptography for security - but is cryptography enough?