Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Help improve safety in case of power grid cyber-attacks!
Editorial Help improve safety in case of power grid cyber-attacks!

The December 2015 Ukraine cyber-attack that took control of the Prykarpattyaoblenergo Control Center (PCC) in the Ivano-Frankivsk region serves as study-case for all cyber-security researchers concerned with possible similar incidents in the US. The said APT attack was performed via a malware

How DARPA crushed the hopes for touch-based authentication
Editorial How DARPA crushed the hopes for touch-based authentication

Smartphones head towards touch-based continuous authentication – a type of permanent identity validation that is also passive, since it does not hinder in any way other human-phone interactions that may be taking place during the same time. That would eliminate the risks of intrusion currently at t

Acoustic fingerprinting, suspended between privacy and marketing tech
Editorial Acoustic fingerprinting, suspended between privacy and marketing tech

If the denomination of acoustic fingerprinting does not fully reveal the core concept, then maybe defining this type of fingerprinting as the mark/pattern based on a digital summary extracted from a short audio signal (summary that includes identifying, recognizing and tracking the audio source)

Embedded risks – when vulnerable circuits threaten IoT
Editorial Embedded risks – when vulnerable circuits threaten IoT

In a pioneering move, cyber-security expert Bruce Schneier approached the risks linked to embedded systems as early as January 2014. Embedded systems cyber-security raised a certain amount of interest in 2015, and will represent an even hotter topic in 2016. Taking a broad view on what embedded

Malvertising:  what is it and how to browse safely
Editorial Malvertising: what is it and how to browse safely

Malvertising is the assigned term for malicious advertising , which represents the action of hijacking legitimate online advertising networks performed by malicious factors in order to inject their own malware-ridden advertisements into the said platforms. The usual shape malvertising takes is that

What do you know on the Dark Web?
Editorial What do you know on the Dark Web?

Let’s open our Dark Web discussion with a question: just how much of the entire Internet would you think is accessible via the usual search engines? Take a wild guess. We have conducted our own mini-inquiry based on this question, and the answers we received ranged from 20 to 40 percent. Well, gu

Ransomware – a trend to stay
Editorial Ransomware – a trend to stay

#ransomware is an actual cyber – phenomenon . First brought to attention in 1989 (the AIDS Trojan or PC Cyborg), then mentioned somewhere back in 2005 ( Trojan.Gpcoder , then the Archiveus Trojan in 2006 that combined ransomware with RSA encryption), 2014 seems to have been its year of choice – the

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later