Can you use emojis in passwords?
No one likes passwords. They take ages to enter, are hard to…
How to check if PC uses BIOS or UEFI on Windows 10
To check if the computer uses BIOS or UEFI on Windows 10,…
Spies on wheels: how carmakers collect and then resell information
Guess which of your possessions is the most active at collecting your…
Malicious “RedAlert – Rocket Alerts” Application Targets Israeli Phone Calls, SMS, and User Information
On October 13, 2023, Cloudflare’s Cloudforce One Threat Operations Team became aware…
Bridging the gap to understanding TAP
It's a never-ending effort to improve the performance of our infrastructure. As…
A Socket API that works across JavaScript runtimes — announcing a WinterCG spec and Node.js implementation of connect()
Earlier this year, we announced a new API for creating outbound TCP…
Know your Malware – A Beginner’s Guide to Encoding Techniques Used to Obfuscate Malware
Know your Malware – A Beginner’s Guide to Encoding Techniques Used to…
Post-quantum cryptography goes GA
Over the last twelve months, we have been talking about the new…
Encrypted Client Hello – the last puzzle piece to privacy
Today we are excited to announce a contribution to improving privacy for…
Top apps for encrypted, private videocalls
Videocalls became much more widespread after the COVID-19 pandemic began, and they…