Sebastian Raiffen

Sebastian Raiffen

IT Security Consultant
Sebastian Raiffen is an IT expert specializing in security development. He explores the latest in cybersecurity and offers practical tools and strategies for enhancing digital defense. His signature writing style incorporates meticulous research and analysis, producing technical content that ranges from dissecting malware to deciphering encryption algorithms. Sebastian is sought after for his in-depth security commentary and expert advice.
Fast&dangerous: do you know the risks of URL shorteners?
Editorial Fast&dangerous: do you know the risks of URL shorteners?

URL shorteners are right under our eyes. You may have noticed how for a while now many of the links shared online, especially (but not exclusively) on social networks started to look like “http://tinyurl.com/SomethingSomething”. Replace tinyurl with goo.gl or bit.ly (where in both cases the inc

When threats lay dormant in your wireless peripherals
Editorial When threats lay dormant in your wireless peripherals

It is an element of progress to have our mouse or keyboard wirelessly communicating with the computer, but have you ever wondered what dangers lie dormant in this efficient technology? A pair of Bastille researchers decided to verify just how vulnerable remote peripherals are  to malicious attacks

Should cyber-crime be afraid of machine learning?
Editorial Should cyber-crime be afraid of machine learning?

Searching for the optimum cyber-security defense configuration lead to the idea of employing machine learning in this field. Enterprises and researchers have regrouped their strategies in the aftermath of each and every notorious breach and attack, only to realize that this move will have to repeat

Smart Home Invaders – just how vulnerable are we?
Editorial Smart Home Invaders – just how vulnerable are we?

A survey on smart home and cyber-security, entitled “Behind our Digital Doors: Cybersecurity and the Connected Home”, revealed among other facts that 67% of the respondents possess between 1 and 5 Internet connected home devices, while 30% have 6 or more devices and 5% of households have 11 or more

Spear phishing – how to be prepared and protected
Editorial Spear phishing – how to be prepared and protected

As a particular type of phishing attack, spear phishing targets from the preliminary phase a certain group, company or organization, with the intent of data stealing. The final goal might be facilitated by an identified or generic weak entry point – and the fraudulent email is tailored to suit this

Tokenization – security’s knight in shining armor?
Editorial Tokenization – security’s knight in shining armor?

#tokenization translates as replacing sensitive data elements with their non-sensitive equivalents. The value of the resulting elements being non-exploitable, this #security procedure is supposed to reduce the risks. In order to retrace the steps back to the original sensitive data, the

Air gapped computers – security issues
Editorial Air gapped computers – security issues

The air gap or air wall technique implies isolating one or more computers from unsecured networks. It can be implemented physically or theoretically, in the second case the isolation being realized only at a cryptographic level. Used in order to protect classified information, payment networks and

Security Trends That Dominate 2015
Editorial Security Trends That Dominate 2015

The latest types of security exploits target connected cars and airplanes . Attacks aiming the essential systems of these kind of machines take the idea of cyber warfare to a whole new level. Since firewalls cannot offer the needed degree of protection, security defense must take a dramatic turn in

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later