Digital Literacy

Meet the non-profits using tech to improve society

5 reasons why you should care about NGOs

5 reasons why you should care about NGOs

Watchlist: Meet the non-profits using tech to improve society

5 reasons why you should care about NGOs

World NGO Day (February 27) recognizes, celebrates and honors non-governmental and nonprofit organizations (NGOs.) Watch our favorite films about tech culture in NGOs. 

How can we defend the most vulnerable from life threatening cyber-attacks? | Tomorrow Unlocked

They distribute billions of dollars each year to those most in need, and that’s why they’re under attack. But now, CyberPeace Institute is finding new ways to protect non-government, humanitarian and healthcare organizations from life-threatening cybercrime. In this episode from Tomorrow Unlocked’s Defenders of Digital series, Stéphane Duguin and Kiara Jordan explain CyberPeace Institute’s strategy.

NYC’s nonprofit DIY internet is taking on Verizon and more | Just Might Work by Freethink

40% of New York households lack either a home or mobile broadband connection. And more than 1.5 million New Yorkers lack both. This digital divide throws up massive barriers to education, work and life. NYC Mesh is challenging the status quo by building an internet infrastructure that is cheaper and potentially more reliable. 

Why Ocean Cleaning Starts With This River | Innovative Techs

The Ocean Cleanup is developing and scaling technologies to rid the world’s oceans of plastic. They work to close the source and clean up plastic accumulated in the ocean. They created the first product (sunglasses) using plastic recovered from ​​the Great Pacific Garbage Patch.

Inherited bias: The trouble with algorithms | Defenders of Digital by Tomorrow Unlocked

Konstantinos Kakavoulis and the Homo Digitalis team are taking on tech giants to defend our digital rights and freedom of expression. These lawyers from Athens explain the dangers of content moderation systems and how discrimination can happen when algorithms inherit the biases of their programmers. 

Fighting every day to keep children safe from exploitation | Defenders of Digital by Tomorrow Unlocked

Susie Hargreaves OBE and her team the Internet Watch Foundation (IWF) hunt down child abuse images online and help to identify children so law enforcement can intervene. We uncover Susie’s critical work tackling the ever-increasing number of child abuse online images around the world. The recent pandemic has triggered a spike in images, but Susie’s team is fighting back with new tech.

For more videos about data privacy and cybersecurity, subscribe to Tomorrow Unlocked on YouTube.

Do you think NGOs get the recognition they deserve?

Read more

How stolen identities led to a wave of crime

How stolen identities led to a wave of crime

Cybercriminals see education as an amazing resource. But they’re not taking classes or gaining qualifications – they target universities and other educational institutions for the wealth of personal information they hold.

In Episode 5 of our series hacker:HUNTER Behind the Screens, The Backdoor into Campus, Royal Holloway, University of London cybersecurity experts talk about the challenges they face keeping students and staff safe from identity theft.

How are educational institutions attacked?

Educational institutions often have large numbers of people using their systems, including staff, students and visitors. They use these systems to offer many kinds of services. 

Mike Johnson is Chief Information Officer at Royal Holloway, University of London. He describes a major security incident at his institution. “A staff member’s credentials were stolen and used to send convincing offers of part-time work to students. Some students undertook the work and were paid. But they were overpaid, then asked to return some of the money. It was money laundering on a significant scale.”

Why is identity theft so compelling for cybercriminals?

Just one stolen identity is enough to conduct a lot of crime. In the digital age, if you know enough about someone, you can impersonate them to access money or commit other crimes, leading law enforcement to the wrong person.

“Commonly we find those who try to attack us are looking to harvest identities,” says Johnson. “When they’ve got them, they’ll try to harvest more, until they’re sure they can attack us in the way they want to.”

How can educational institutions prevent identity theft?

It’s all about authentication, says Keith Martin, Professor of Information Security at Royal Holloway, University of London: Knowing the person trying to access your online spaces is the right person. He uses real-world situations to explain. “Imagine a front door. Whoever’s got the key can open it. To breach that, you need to get hold of the key. Entering a country is more high security. The person at border control not only looks at credentials – a passport – but also at the person submitting it.”

Professor Martin continues, “In cyberspace it’s a bigger problem, because we can’t see who’s asking for access. The most popular authentication is a password, but they’re like keys – easily copied or stolen. So we need to use the passport model – asking for multiple things to gain access.”

It’s called multi-factor authentication. Those who want to gain access need more than a password, for example, a code sent by sms or biometrics, like a fingerprint.

Senior security researcher at Kaspersky, Noushin Shabab recommends for the greatest security, multi-factor authentication should combine biometrics like facial recognition with another credential.

Developing ‘cyber common sense’ in education

Professor Martin says the most important thing anyone can do is develop ‘cyber common sense.’ “Just hesitate before doing anything in cyberspace – if you’re sent a link or a message asking for information, just hesitate, and ask, why do they want this?”

Johnson feels education institutes are the perfect places to learn cybersecurity awareness. “We’ve got to be willing to have a conversation with students about digital security and what protecting their identities means. Fundamentally, we’re educators – we’re well placed to help people operate in an environment they’ll operate in for a long time.”

For more videos on protecting tomorrow, subscribe to Tomorrow Unlocked on YouTube or follow us on Instagram.

Can we prevent our identities from being stolen?

Read more

Watchlist: 6 reasons why you should care about data privacy

Learn more about keeping your data private in these films we love

Learn more about keeping your data private in these films we love

Watchlist: 6 reasons why you should care about data privacy

Learn more about keeping your data private in these films we love

Data Privacy Week (January 24 -28) is an international campaign from the National Cybersecurity Alliance about privacy, trust, and protecting data. This year’s event encourages people to own their privacy by learning how to protect their online data. Check out our favorite films about digital privacy.

Did You Know Others Can Read Your Emails?  | Tomorrow Unlocked

ProtonMail is hoping to change privacy expectations for the tools we use to communicate. In this episode of Tomorrow Unlocked series Defenders of Digital, Bart Butler reveals why your email isn’t as secure as you think and what to do about it.

Getting your piece of the data economy | Freethink

Nearly everything we do — the songs we listen to, the shows we watch, heck, even just walking down the street — now results in creating data. That’s why Angela Benton founded Streamlytics, a company that allows consumers to see who is harvesting your data, how it’s being used — and how to get your cut.

Data Privacy – Who Cares? With Amelia Dimoldenberg | Dave

Data is now the world’s most valuable asset, Amelia Dimoldenberg investigates whether we should be worried about tech companies selling our data and what data the public thinks is acceptable to share.

Should police be allowed to use phone tracking tech? | Tomorrow Unlocked

Freddy Martinez, Executive Director of The Lucy Parsons Labs in Chicago, has helped rewrite US privacy legislation. He explains how law enforcement can use ‘stingrays’ to identify and track you through your phone, and their legal campaign against this infringement led to rewriting US privacy laws.

Is Your Privacy An Illusion? (Taking on Big Tech) – Smarter Every Day 263

Destin Sandlin is an engineer and co-founder of 4Privacy, an end-to-end encryption platform. He explains the current privacy situation, how we got here, and what we can do to push back. 

Defenders of Digital – Episode 5: Kira Rakova

“I have nothing to hide so why should I care?” That’s what many think. But it’s not just about wanting to hide online. While most of us know privacy is important, we can’t always protect ourselves.

For more videos about data privacy and cybersecurity, subscribe to Tomorrow Unlocked on YouTube or follow us on Instagram.

Do you think data privacy is one of the biggest issues of our time?

Read more

Young bright mind detects deepfakes in a heartbeat

Young bright mind detects deepfakes in a heartbeat

At 19, Gregory Tarr’s new techniques for identifying deepfakes won him BT Young Scientist of the Year 2021. In our latest video in the Young Bright Minds series, Tarr explains how he’s overcome some of the challenges of spotting this AI-created media at scale.

What are deepfakes?

A deepfake is any media (usually video) with one person’s voice or face mapped onto another’s using AI-based software. They’re often meant to be funny or satirical, like placing Donald Trump in criminal underworld TV series Breaking Bad or critiquing Facebook’s data collection seemingly from the top

But some deepfakes are less obvious. They can spread fake news or otherwise fool people into thinking someone said or did something they didn’t.

Finding deepfakes in a heartbeat

Tarr radically improved existing processes for detecting deepfakes. “I was able to speed things up ten times.”

The deepfake detection method is fascinating. Tarr explains: “Photoplethysmography means graphing the light of the blood. Every time your face receives a pulse of blood, green and red hues change slightly. You can track that over time in a video.”

Scaling is the hardest part

“Many companies trying to detect these deepfakes have built models that work in lab environments,” says Tarr. “But because of the sheer size of the problem – hundreds of millions of videos – having the infrastructure and the computing power is a harder problem.”

Tarr is founder and CEO of Inferex. His business wants to work with companies’ deepfake detection models and deploy them across thousands of computers.

Tech no substitute for awareness

Tarr warns that technological solutions will only go so far in fighting fakes – we need to change how we think about what we see and read. “The only solution is that people wisen up. We need to be more aware that things we’re seeing or reading may or may not be true.”

For more videos about Young Bright Minds, subscribe to Tomorrow Unlocked on YouTube or follow us on Instagram.

Could you be fooled by a deepfake?

Read more

Young Nigerians’ movie Clicks with Kaspersky

Nigerian teen collective The Critics is gaining global attention with self-taught filmmaking. The Click, explores a fictional cybercrime adventure.

Nigerian teen collective The Critics is gaining global attention with self-taught filmmaking. The Click, explores a fictional cybercrime adventure.

Young Nigerians’ movie Clicks with Kaspersky

Nigerian teen collective The Critics is gaining global attention with self-taught filmmaking. The Click, explores a fictional cybercrime adventure.

A collective of Nigerian teenagers called The Critics is making waves across the world. They make their groundbreaking movies using recycled smartphones and things they’ve learned in online tutorials.

Their recent short Z: THE BEGINNING went viral, catching global film heavyweight attention with its creativity and homemade special effects.

Tomorrow Unlocked is among the first brands to have commissioned The Critics to make a new film, The Click, written and directed by Godwin Gaza Josiah.

The Click: Plot Summary

Mel, played by Esther Ukata, lives with her sick mother and works a repetitive job, all the while investigating her father’s mysterious disappearance.

When an old acquaintance offers Mel a lucrative job hacking elite cybercrime gang The Click, she’s reluctant to get involved. But when her mother’s condition worsens, stress gets the better of Mel and she takes the job.

Remembering skills she learned from her father, Mel succeeds in breaking through the gang’s defenses. But they won’t take this lying down. Will Mel find out what happened to her father?

For more videos on inspiring tech innovation, subscribe to Tomorrow Unlocked on YouTube or follow us on Instagram.

Is it ethical to hack a cybercrime gang?

Read more

Down with Doxing: What to do to stop it

Your data matters - simple tips to keep it sage from a new wave of cybercriminial

Your data matters - simple tips to keep it sage from a new wave of cybercriminial

Down with Doxing: What to do to stop it

Your data matters - simple tips to keep it sage from a new wave of cybercriminial

Doxing. Have you heard of it? If not, here’s why you might want to get up to date and some simple tips to keep protected. Essential personal data protection reading.

Open access to data – friend or foe?

The accessibility of information today is one of our most empowering freedoms. But it can also fuel malicious personal attacks, known as doxing or doxxing. We’re about to take you through what doxing is, how criminals do it and how to prevent it.

What is doxing?

Doxing is maliciously revealing personal information online, for example, posting an anonymous blogger’s real name or address. Doxers aim to punish, intimidate or humiliate their target by finding out sensitive information and using it against them, like selling your credit card details or threatening to burgle your home.

The never-ending black hole of personal information that is the internet means anyone with the time, motivation and interest can weaponize your personal data. And doxing is a growing problem.

How does doxing work?

These are the most common ways doxers grab data to expose someone.

Tracking usernames

When someone uses one username across multiple platforms, doxers can follow the trail.


Phishing scams are fake emails luring victims to click through to a malicious site where attackers may steal sensitive information.

Stalking social media

Geotagging your photos? Sharing your work location? Doxers can use this to build up a picture of your life and even to deduce the answers to your account security questions.

Is doxing that bad?

Yes. Doxing can have catastrophic consequences.

In 2015, hackers forced entry to dating site for people in committed relationships, Ashley Madison, stealing 32 million users’ data. They demanded payment to return the records but didn’t get it, so published all the data online, causing professional and personal harm, and probably a divorce or two. And then in 2020 Ashley Madison’s attackers came back for more.

Doxing knows no bounds. There are no clear good or bad sides. After an anonymous UK-based security researcher saved the world from a powerful cyberattack, the media outed his real identity and address, leaving him open to a revenge attack from the cybercrime group he went out to stop. Marcus Hutchins’ story is one of a kind.

Protect yourself from doxers with this checklist

Recent research shows more of our data is being sold to organizations and criminals. Cybercriminals could use almost all of it for doxing or cyberbullying.

Credit cards and banking log-ins are the most in-demand. They’re used for extortion, phishing schemes and straight-up money theft. Meanwhile, doxxers use personal account access to cause reputational harm. How do you stop it happening to you? This anti-doxing checklist has everything you need to stay safe.

Keen to learn more about doxing and how to prevent it?

Kaspersky, in collaboration with, has just released a free doxing training course. You’ll learn about the dangers of dox attacks, how to protect against them and what to do if you’re a victim.

Read more

NFTs explained: Why pay $170,000 for digital art?

Intro to cryptoart and non-fungible tokens (NFTS)

Intro to cryptoart and non-fungible tokens (NFTS)

NFTs explained: Why pay $170,000 for digital art?

Intro to cryptoart and non-fungible tokens (NFTS)

A non-fungible token (NFT) of digital kitten art sold for 170,000 US dollars. These tokens could change how we buy, sell and own digital media. What are they, and could they build a new creative economy? To start, check out the video above from CNBC!

Is this the art of true ownership in the digital age?

Most of us can make a GIF, take a picture or record a clip, but what if you could sell those and other digital media for hundreds of thousands of dollars? With the rise of non-fungible tokens (NFTs), pictures, short clips of comedians, GIFs and every other form of digital art is now being tokenized and sold just like a physical painting.

What is an NFT?

Non-fungible tokens (NFTs) are a digital certificate of ownership of a piece of digital information that can be bought and sold. It works the same way as cryptocurrency: Secure transactions made between two parties recorded permanently through blockchain. The difference is, with bitcoin – a popular cryptocurrency using blockchain – you can trade one coin for the other and it has the same value, but NFTs are one-of-a-kind. Each NFT is unique and can have a different value.

You can make NFTs of almost anything digital, but the big news is they’re starting to be used to buy and sell digital art, known as cryptoart.

Why NFTs can benefit digital artists and art buyers

Uniqueness has always been central to the art market. Digital art is hard to sell, and for buyers, hard to ‘own’ because of the potential for an infinite number of copies. NFTs could solve that problem.

For creators, NFTs are super trendy and therefore add to your enigmatic status, and they have a handy sell-on feature. If you sell a GIF using NFTs, you get a percentage every time the NFT is sold to a new buyer. Imagine Van Gogh selling a painting, then getting a slice of every resale, forever.

And if you’re a buyer, you have a concrete claim of owning a piece of digital art. And speaking of buying, you might want to see this.

A world gone mad for NFTs

The best way to understand the NFT market explosion is to see some pieces that have fetched crazy sums. Brace yourself.

This Nyan Cat GIF sold for almost $600,000 US dollars.

Article in the NY Times

Grimes – The NFT goldrush continues

This 50-second video by Grimes sold for almost $390,000.

Watch the video here.

Beeple – Authenticated by blockchain

This video by Beeple sold for $6.6 million.

Watch the video here.

Crypto financial and environmental impacts

Many financial experts have warned that this could be an investment bubble that, if it bursts, could mean big losses.

And while NFTs are making the digital art world fairer, they come with a warning. The sale of a crypto art piece can use the same amount of energy in one transaction as an art studio uses in two years.

How  artists can benefit

If you’re an aspiring or established artist or content creator, no promises, but this could be big for you. First, prepare your work ready, whether it’s a GIF, picture or video. Then, when you’re happy with it, start on NIfty Gateway. On Nifty Gateway, you can apply to create a project for them to sell.

Will you get into the world of cryptoart? Share your favorite pieces with us on Facebook and Twitter.

Read more

Unravelling the 2018 Pyeongchang Olympic cyberattack mystery

Is the Olympics hacker heaven? Tech highs and lows

Our video picks: Olympic Games – tech success or failure?

As the Olympic torch begins its journey to Tokyo 2021’s opening ceremony, we ask, is the Olympic Games a chance for technology to shine or a data breach waiting to happen?

Tech successes and failures at the Olympic Games

In ancient Greece, the Olympics began some 3,000 years ago as a sporting event to honour the god Zeus. As the iconic torch sets off on its journey to the Tokyo 2021 opening ceremony, we ask if the Olympic Games is where new technological standards are set, or a breeding ground for emerging cyber threats.

Tech successes and failures from Olympic history range from robotics to autonomous vehicles, to merciless malware that tried to start a cyberwar.

Highlight: Did this drone display steal the show?

Good Morning America shows us how new drones from Intel will change medal ceremonies forever.

Highlight: Tokyo’s high-tech plan for 2020 Olympics

With the Tokyo 2020 Olympic Games just around the corner, here’s a snapshot of the incredible technology the organizers will use to make the event smoother and more enjoyable for everyone.

Lowlight: One of the most deceptive hacks in cyber history?

If successful, the 2018 Pyeongchang Olympics’ cyberattack would have left a geopolitical disaster in its wake. hacker: Hunter Olympic Destroyer is a three-part series exploring the mysterious motives behind the attackers, why it’s one of the most deceptive cyberattacks in history and the ‘extraordinarily brilliant’ response that stopped it in its tracks. Watch the full 2018 Olympic cyberattack series.

The Olympic Games is one of the biggest stages on Earth to champion technology in all forms. But with more than sports at stake if things go wrong – think, mountains of personal data and even competitors’ health – how can businesses and organizations make sure this event and its tech is safe for all to enjoy?

Read more

What kids searched for online during lockdown

How to talk tech and keep your kids safe online

How to talk tech and keep your kids safe online

What kids searched for online during lockdown

How to talk tech and keep your kids safe online

Children around the world, like all of us, had an unusual time in 2020. Instead of adventuring in the great outdoors, they were making do with what they had – exploring the far reaches of the internet. But what exactly were they doing and how can parents protect them?

Where did kids spend most of their time during lockdown?

Photo by Pixabay from Pexels

A new study from Kaspersky Safe Kids shows that during the winter of this pandemic, despite restrictions, kids entertained themselves online, with YouTube (21 percent) and gaming (15 percent) being the most popular activities. The top topic on YouTube? Video games. Kids went mad for them. 37 percent searched for video game clips, including channels of game streamers who play different games and channels for specific games like Minecraft.

Another new trend was TikTok, which has exploded to 800 million monthly active users in more than 150 countries.

It’s official – more of our kids’ lives are being lived online. Agreed, the web and its many applications are great for keeping children entertained, but how do you protect them from threats?

“Get home before the dark.” “Look left and right before crossing the street.” “Don’t talk to strangers.” Classic parental lines from the pre-internet era. But it’s easy to forget that what’s inside the home may be just as dangerous as outside it in today’s connected world.

The internet and mobiles bring us entertainment, education, and excitement – but also cyberthreats, like strangers wanting to befriend your child online. The study shows although 84 percent of parents are worried about their children’s online safety, on average, they only spend a total of 46 minutes talking to them about online security throughout their entire childhood. So how can you keep your children safe online? #TimeToTalkOffline

Educate yourself

Getty Images

Before you can talk confidently about web safety with your kids, you first need to know more than how to throw a sheep on Facebook or avoid using ‘reply all’ on an office email joke thread. Educate yourself now about topics like fake news, cyberbullying or online grooming. Teach yourself how to keep your data safe online and then show your children how to do it. Let them know that what goes on the web stays on the web, even if it gets deleted from their profiles. And the most important part: make them talk to you the moment they sense something could be wrong – whether someone has taken their videos, or a stranger is asking them to share private photos.

Learn more about your children’s interests

Photo by August de Richelieu from Pexels

Without being pushy or overbearing, try talking to your child about what they search for and what they enjoy. That way, you can keep a closer eye on those particular sites. Need a hand? Kaspersky Safe Kids can provide you with regular reports about how they spend their time online. The app analyzes your children’s search activity and manages screen time without encroaching on their personal space.

Act as a role model

Getty Images

No matter what we tell our kids, we have to lead by example: if you’re a smoker, no matter how often you tell your children that smoking is bad for them, they are twice as likely to begin smoking. We can all talk a lot; in the end, our kids will copy our behavior and not just what we preach. Be careful of how you use the Internet, don’t take your mobile with you when going to the toilet, and if your kids allow you to befriend them on social media (lucky you,) don’t judge them when they post jokes or complain about their homework – because they are well aware of how to keep you from seeing their posts, without you knowing – but teach them well and make them understand the consequences.

Trust goes both ways

Getty Images

You can’t expect your kids to trust you if you check their browser history every time they use the computer (and they probably know how to delete it anyway 😉 Otherwise they’ll start getting sneaky and hide things from you. If your child thinks they’re doing something wrong and might get in trouble if you find out, then when they are in real trouble, let’s say a stranger online tells them to “brush your hair and take your picture,” then they may not talk to you.

Read more about how kids coped with COVID-hit winter holidays on SecureList.

Read more

Meeting the organization fighting to kill fake news

Meeting the organization fighting to kill fake news

Read more

Loading more articles