Marc is a technology journalist with over 15 years experience. He specializes in content related to emerging technologies, cybersecurity, big data, privacy, artificial intelligence, and the politics of technology.
He has worked for some of the largest tech companies (Deluxe Digital, Sony, Autodesk) and is passionate about online privacy and digital freedom.
Cryptanalysis is a collection of techniques used to break encryption without obtaining the decryption key. What are these techniques? How do they work? And what can be done to protect against them?
QR codes are kind of cool. But they're also vulnerable to a pretty nasty online attack, called QRLjacking. In this post we look at what QRLjacking is and how you can avoid it.
Online attacks are extremely prevalent and can do a lot of damage. In this article, we focus on CORS attacks, how they work and what you can do to avoid them.
You may have heard of Man in the Middle attacks. One subtype of this attack is called a Man in the Browser attack (MitB). We look at what MitB attacks are and what you can do to prevent them.
Most of us like technology and where it takes us. But can it go too far? In this post, we discuss digital passports and some of their potential consequences.
Session hijacking can leave you locked-out of your critical accounts. Read on to learn what session hijacking attacks are and what can be done to avoid them.
VPNs are meant to hide your original IP address. But in certain circumstances, your IP address may be leaking. This post looks at how IP leaks occur and what you can do about them.