Sections

Viewpoints

How Bitcoin has sparked what may be a techno-industrial revolution

Blockchain technology isn’t just about crypto cash; it could be the basis for giving individuals control of their digital personas

30 October 2019 min read

Who owns your data? Probably not you

perex__ Supreme Court rulings show how technology and the law evolve

Supreme Court rulings show how technology and the law evolve

28 October 2019 min read

Twin terrors: The rising threat of credential stuffing and account takeovers

perex__ Darknet tandem takes full advantage of Big Data, high-velocity software, and automation

Darknet tandem takes full advantage of Big Data, high-velocity software, and automation

15 October 2019 min read

Sky-high concerns: Understanding the security threat posed by drones

perex__ They are susceptible to all the cyber threats that face the Internet of Things, and can be hijacked for unintended purposes

They are susceptible to all the cyber threats that face the Internet of Things, and can be hijacked for unintended purposes

26 September 2019 min read

AI never forgets, so we must teach it to forgive

perex__ {value=Artificial intelligence is listening, and that is unstoppable – but we must all safeguard the privacy of children}

Artificial intelligence is listening, and that is unstoppable – but we must all safeguard the privacy of children

22 September 2019 min read

A primer on the promise and pitfalls of the Internet of Things

perex__ {value=Granular behavior profiling paves the way for new digital lifestyles – and creates big privacy and security questions}

Granular behavior profiling paves the way for new digital lifestyles – and creates big privacy and security questions

12 September 2019 min read

Visit Avast website

Hackers set the pace in security

perex__ Criminals get a head start, but we can chase them down with laws, industry tools, and consumer protection

Criminals get a head start, but we can chase them down with laws, industry tools, and consumer protection

11 September 2019 min read

La Liga: Turning users into involuntary spies

perex__ There is little that security software can do when the users themselves give apps broad permissions

There is little that security software can do when the users themselves give apps broad permissions

22 August 2019 min read

Does the U.S. need its own privacy law?

perex__ A look at how the GDPR model would fit with state laws and the needs of American businesses and consumers

A look at how the GDPR model would fit with state laws and the needs of American businesses and consumers

12 August 2019 min read

How ransomware rose to become an enduring scourge

perex__ Poorly defended cities are getting devastated by cyber blackmail shutdowns; companies relying on MSPs likely are the next big targets

Poorly defended cities are getting devastated by cyber blackmail shutdowns; companies relying on MSPs likely are the next big targets

6 August 2019 min read

AI is on our side

perex__ Despite some widespread fears, artificial intelligence can help cybersecurity by blocking fake news and other threats

Despite some widespread fears, artificial intelligence can help cybersecurity by blocking fake news and other threats

30 July 2019 min read

A primer on cyber espionage across the planet

perex__ State-backed cyber spying is pervasive – and its impact on geo-political affairs is deepening

State-backed cyber spying is pervasive – and its impact on geo-political affairs is deepening

25 July 2019 min read