cybersecurity
Our personal, digital, national and military security depend on a safe cyber space.
A Certain Transparency
While the reputations of Cambridge Analytica and Facebook are being slaughtered in the news, the state of our privacy is being questioned. Are we too willing to give open ourselves up to Big Brother? What are the consequences of such an open society? Is such a society even open?
By Harriet Weston8 years ago in 01
How to Stop the Next Data Mega-Breach
When the consumer credit report agency Equifax suffered a data mega-breach, the information of 143 million Americans was compromised. Prior to then, eBay, Yahoo, and Target all also suffered breaches. And then there's the 2016 hacking of the US Election by Russia, which played a decisive role in putting Trump in the White House.
By Ben Kharakh8 years ago in 01
How To Protect Your iCloud Account From Hackers
Your iCloud account is so convenient, isn't it? It's easy to use, allows you to have all your files backed up in a nice little bank, and even connects your account to a bunch of different devices. The iCloud is the ultimate way to safely store tons of things—or is it?
By Riley Raul Reese8 years ago in 01
How to Keep Your Home Wi-Fi Safe From Hackers
Cybersecurity is one of the single most important concepts for most router manufacturers and network designers. Reshaping the way our networks can be both faster and far better protected will be among many ways the internet is overall adapted in the next few years, but you won't have to wait that long to keep your home Wi-Fi safe from hackers. It has become much easier for hackers to break into firewalls, disrupt security measures, and burglarize your home system, what with the debilitating WPS feature and the need for enabling your firewall after set-up, knowing how to adapt to these threats is just how you can avoid them.
By Salvador Lorenz8 years ago in 01
Spectre Attack
In the era of computer systems, time and performance is very important. To achieve that, computer scientists works hard to make CPUs better and faster. Most of the modern CPUs in present devices around the world make use of a performance feature called speculative execution. Speculative execution improves the performance of the CPU. It does that by guessing future tasks and executing the instruction. In normal cases, the task comes from the memory and it is executed by CPU, and results are stored in the storage. For better performance using speculative execution, the task is guessed by CPU and executed. When the task comes from memory, the CPU makes sure the correctness of its initial guess. If the guess was incorrect, the CPU reverts speculative execution. If the guess was correct, a significant performance gain is achieved.
By Dharmang Patel8 years ago in 01
Cybersecurity Predictions for 2018 You Should Know
In the 2010s, we have seen serious evolution when it comes to technology—both good and bad. We've seen the birth of the cryptocurrency boom, as well as a new birth requiring us to spot Bitcoin scams a mile away. We've even seen the booming growth of the Dark Web and some of the best black hat hackers in history make their marks.
By Cato Conroy8 years ago in 01
Smartest Ways to Hack Proof Your Phone
No matter how well President Trump may extend his diplomatic tirades into 280 characters or less, no button of any size can holistically thwart internet hacking. Your phone? That's a prime target, my friend. Think about this: while that neat touchscreen device may be, at its barest stage, a cellular phone for mass communication, it has obviously been enhanced over the years with cameras, internet connectivity, and background multi-app functionality only a few examples. If you don't have protection for your phone, whether it be a password management application or even some encryption program, safeguarding your internet documents and private information should be of utmost concern.
By George Herman8 years ago in 01
Facts about the Dark Web That Will Scare You
The dark web is made accessible by a software called The Onion Router. This software makes a person's presence on the internet virtually anonymous, which is what makes the dark web so nefarious. Most of the things you can do or find on the dark web you can also find in real life or on the deep net, but the dark web makes conducting suspicious activity much easier.
By Dr. Ethan Levi8 years ago in 01
Cryptography: A Whole New World
You may be wondering what exactly this article is, and what cryptography is. That's what I am trying to tell you here. Cryptography is everywhere, and in a sense, it's the only way for people to remain completely private about certain things. Cryptography is a lock you put on your information that only you have the key to. The word Cryptography comes from the Greek Kryptos, meaning secret, and -ography meaning the study of. The study of secrets.
By Kryptos Journal8 years ago in 01
Cyberhack Reveals Sony’s Embarrassing Decisions from ‘Mundane’ Adam Sandler Movies to Calling Angelina Jolie a ‘Spoiled Brat’
While North Korea has openly denied any association with the recent cyber hack episode, Sony is in damage control mode trying to seal the walls of internet with tactical super glue.
By Mohammed Hidhayat8 years ago in 01











