Sections

Viewpoints

Balkanization and globalization: the battle for freedom in the internet

Nationalism is fueling the isolation of the internet

20 February 2020 min read

Iran’s revenge is already well under way

perex__ Long stretch of reconnaissance, malware plantings position Iran to carry out varied attacks on the U.S. and its allies

Long stretch of reconnaissance, malware plantings position Iran to carry out varied attacks on the U.S. and its allies

29 January 2020 min read

Keeping your part of the IoT safe

perex__ The Internet of Things is vast, complex, and filled with risk – but network security can simplify it

The Internet of Things is vast, complex, and filled with risk – but network security can simplify it

22 January 2020 min read

2020: Rise of the world's elite hackers

perex__ The geopolitical cyberwar between Iran, China, North Korea, Russia and the liberal democracies is about to get very sophisticated

The geopolitical cyberwar between Iran, China, North Korea, Russia and the liberal democracies is about to get very sophisticated

6 January 2020 min read

What you need to know about the CVV numbers on the back of your credit card

perex__ {value=Attention holiday shoppers: The card verification value should never be stored online }

Attention holiday shoppers: The card verification value should never be stored online

11 December 2019 min read

What everyone needs to know about the technical foundation of digital privacy

perex__ {value=Efforts are progressing to preserve Public Key Infrastructure and digital certificates at the core of cybersecurity}

Efforts are progressing to preserve Public Key Infrastructure and digital certificates at the core of cybersecurity

5 December 2019 min read

Visit Avast website

How Bitcoin has sparked what may be a techno-industrial revolution

perex__ Blockchain technology isn’t just about crypto cash; it could be the basis for giving individuals control of their digital personas

Blockchain technology isn’t just about crypto cash; it could be the basis for giving individuals control of their digital personas

30 October 2019 min read

Who owns your data? Probably not you

perex__ Supreme Court rulings show how technology and the law evolve

Supreme Court rulings show how technology and the law evolve

28 October 2019 min read

Twin terrors: The rising threat of credential stuffing and account takeovers

perex__ Darknet tandem takes full advantage of Big Data, high-velocity software, and automation

Darknet tandem takes full advantage of Big Data, high-velocity software, and automation

15 October 2019 min read

Sky-high concerns: Understanding the security threat posed by drones

perex__ They are susceptible to all the cyber threats that face the Internet of Things, and can be hijacked for unintended purposes

They are susceptible to all the cyber threats that face the Internet of Things, and can be hijacked for unintended purposes

26 September 2019 min read

AI never forgets, so we must teach it to forgive

perex__ Artificial intelligence is listening, and that is unstoppable – but we must all safeguard the privacy of children

Artificial intelligence is listening, and that is unstoppable – but we must all safeguard the privacy of children

22 September 2019 min read

A primer on the promise and pitfalls of the Internet of Things

perex__ Granular behavior profiling paves the way for new digital lifestyles – and creates big privacy and security questions

Granular behavior profiling paves the way for new digital lifestyles – and creates big privacy and security questions

12 September 2019 min read