Sebastian Raiffen

Sebastian Raiffen

IT Security Consultant
Sebastian Raiffen is an IT expert specializing in security development. He explores the latest in cybersecurity and offers practical tools and strategies for enhancing digital defense. His signature writing style incorporates meticulous research and analysis, producing technical content that ranges from dissecting malware to deciphering encryption algorithms. Sebastian is sought after for his in-depth security commentary and expert advice.
The New Cold Boot Attack Leaves Most Systems Vulnerable
Editorial The New Cold Boot Attack Leaves Most Systems Vulnerable

Security researchers have recently found that almost “all modern computers” are vulnerable to a modified version of the old cold boot attacks.  This new version, discovered by a Finnish company last year, can interfere with a machine’s firmware in order to disable all security measures and allow an

Ethical Hacking: A Critical Cog in the Future of Cybersecurity
Editorial Ethical Hacking: A Critical Cog in the Future of Cybersecurity

Every headline-grabbing cyberattack unveils new sophisticated hacking techniques, but the attacker’s portrait remains the same: a modern-day professional with a strong sense of curiosity, patience, and social skills that thoroughly examines a company’s systems, takes note of every vulnerability, the

The Dangers of Using Facial Recognition Technology to Secure Your Business
Editorial The Dangers of Using Facial Recognition Technology to Secure Your Business

Facial recognition technology is the new gold standard for the modern business world. Although these face-detecting systems have been around for decades, their use has expanded tremendously in a rather short period of time. So much, in fact, that they are now powerful enough to authorize payments,

4 Common Ways Your Employees Can Compromise Your Security
Editorial 4 Common Ways Your Employees Can Compromise Your Security

Even though cybersecurity solutions are becoming increasingly sophisticated, hackers are still managing to keep up even with the most advanced technologies. Furthermore, companies get so caught up in trying to adopt new technologies in their endless search for 100% protection that they forget to

How to Safeguard Your Mac from Malware
Editorial How to Safeguard Your Mac from Malware

You think your Mac is safe from malware? Think again. While Macs do have some integrated protection against malware, they can still get infected. The good news? According to SecureMac.com , “even as Trojan Horses, adware, and other types of malware are becoming more common on the Mac operating s

The Makings of a Great Incident Management Process
Editorial The Makings of a Great Incident Management Process

The importance of incident management is increasing. We’ve gotten to the point where every company, regardless of size, needs to have a proper Incident Management Process implemented. Why is it so important?   Simply because no one is exempt from cyber threats , and with today’s companies shifting t

Is online anonymity just a myth?
Editorial Is online anonymity just a myth?

Browsing anonymity may seem appealing for various reasons. Regardless of whether they have something worth hiding/protecting or not, those who know better appreciate the value of online privacy protection. But is VPN-supported anonymity all it is rumored to be, or not? A study coming from a joint

I spy with my digital eye… smartphone-induced risks
Editorial I spy with my digital eye… smartphone-induced risks

The idea that smartphone cameras may represent cybersecurity risks is not new. Smartphone-induced risks have plagued researchers from the beginning of this trendy devices’ rise. In time, specialists analyzed various scenarios. More recently, an official incident determined a new wave of smartphone c

Beware the traps of security automation
Editorial Beware the traps of security automation

Cyber security automation may represent a relief for specialists. With its unmatched potential of big data processing, automation in this field is the only foreseeable counteraction once the global-scale Internet of Everything provides a new playing field for hackers everywhere. However, besides

Another day, another demo exploit – this time, Chrome is the tattletale (autofill vulnerabilities)
Editorial Another day, another demo exploit – this time, Chrome is the tattletale (autofill vulnerabilities)

Unfortunately, often in the digital environment what makes things faster and easier is riddled with cyber security risks. This time, it is about the autofill feature. Finish specialist Viljami Kuosmanen illustrated how easy it is for third parties to get private user data via autofill storage. The

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later