What is Wireshark – and how does it work?

Chances are if you’re capturing packets and analyzing network traffic, you’re using Wireshark – it’s the world’s leading capture tool, after all. But how exactly does Wireshark it troubleshoot network issues, a…

Privacy fears as Indian city scans women's expressions

Experts have raised privacy concerns after Indian authorities announced proposals to roll our facial recognition cameras designed to track women’s facial expressions for signs of harassment. The police will introduce the overreaching …

What is data retention and why should you care?

Governments all over the world are hugely interested in tracking what citizens do online. This kind of digital surveillance allows the authorities to gain unprecedented levels of information about their citizens – even if those p…

How to send a secure email

Edward Snowden’s explosive revelations in the summer of 2013 exposing to the world the alarming extent of the NSA’s mass surveillance practices sent shockwaves around the globe and triggered a profound shift in the ways we …

What is a whaling attack?

Whaling attacks see hackers target senior executives, using social-engineering, in order to trick them into transferring funds or bank details. Whaling is often spoken about in the same breath as phishing – but a whaling scam is typic…

5 best New Zealand cloud backup services

By now, you’ve probably amassed an impressive collection of photos, documents, music and more – and whether they’re personal files or an important part of your job, you’d probably be upset if they went up in a puff of…