Ransomware as a service, (RaaS), lets malicious parties use predefined malware, in order to extort their victims of choice. Available online, these cyber crime – to lease – deals are making the digital environment even worse. So far, only those who had hacking abilities could (in theory) pose
Recently, Kaspersky officially launched their own Operating System, targeted at control systems, network devices and IoT-related operations. The product is the result of 14-years of hard work and, of course, puts cybersecurity in the spotlight. We should see amazing features in this completely new
During a recent conversation I was surprised to find out that not all people understand the value of privacy protection. Unless confronted with the perspective of their data ending up in malicious hands, of course. However, when talking about privacy rights and their importance in the online
Slowly, but firmly, digital security replaces cyber-security. Some may experience surprise or confusion. More articles, more companies’ resources and presentations use the new term instead of the traditional one. What is going on? How does digital security differ from cyber-security? Most
The next year is not so far now. Cyber Defence 2017 is shaping up. By this we mean all cyber-security lines of defence, research-level and company-level. What will the trends be and how will they unfold? Although surprises are not excluded (see the recent Dyn attack), some have started to release
Cyber-security nowadays is getting more and more competitive, and it certainly is a battlefield where companies can suffer losses of huge proportions when hit. Even zero day exploits can cost vast amounts of money if not remedied in time, and that is just one of the effects. Damaged reputation also
Macro in computing represents a set of rules or patterns that match a certain input sequence to a specific output sequence, thus serving in automating software functions. They are essentially time-saving ways of launching repetitive tasks, and many organizations need to employ macros on a daily
Managing a personal Facebook account takes a few efforts in order to efficiently protect the individual privacy, since the default settings allow any stranger to find out quite a few details on the account owner: date of birth, location, interests, and friends are the most exposed by default
While a recent report coming from the Institute of Electrical and Electronics Engineers shows that according to nearly 1400 tech enthusiasts (out of 2000 surveyed) mobile payment is sure to take over the payment market and clearly will surpass cash and credit cards by the year 2030, other online
The simplest way to describe homomorphic encryption would be the following: HE is the particular type of converting data into cipher text that allows this encrypted data to further get analyzed, permuted, associated to, and generally used into various computations without any decryption involved.
ITCurated uses cookies to personalize your experience on our website. By continuing to use this site, you agree to our Cookie Policy