Editorial

How anonymity networks could protect users from IoT risks
Editorial How anonymity networks could protect users from IoT risks

In what anonymity networks are concerned, all discussions revolved so far around Tor, its characteristics, its Dark Web gateway providing quality and its crucial role in tracking criminals in a few famous cases. Now that MIT researchers developed the Riffle network, dedicated to a similar type of

Hackers take on bug hunting and become tech heroes
Editorial Hackers take on bug hunting and become tech heroes

Although a lot of unflattering virtual ink has been consumed to characterize hackers and many alarming things have been said about their skills, it is however incontestable that these people are extremely gifted, IT-wise. Turning the hackers’ talent toward law-abiding activities can prove a very u

Security automation and psychology share risks: the recency bias
Editorial Security automation and psychology share risks: the recency bias

The rate of information increase nowadays is unprecedented, making big data look like a virtual triangle-shaped bundle, whose base is continually growing larger as we speak. The older information lies somewhere beneath this immediate bunch of huge data, and this structure determines the prevalence

Do you know who might steal your healthcare data?
Editorial Do you know who might steal your healthcare data?

Smartphones and phone-connected wearables are increasingly capable of collecting data on individuals and their environment via high-tech sensors. From heart rate, pulse, and body temperature to location, air quality, humidity and other relevant characteristics, the tiny elements embedded in our

Don’t become a social engineering victim – know your Facebook
Editorial Don’t become a social engineering victim – know your Facebook

Managing a personal Facebook account takes a few efforts in order to efficiently protect the individual privacy, since the default settings allow any stranger to find out quite a few details on the account owner: date of birth, location, interests, and friends are the most exposed by default

Network monitoring tools: take a walk down this lane for some of the best options
Editorial Network monitoring tools: take a walk down this lane for some of the best options

Any network, from small to complex, needs a comprehensive network monitoring foundation that enables the network administrators to track network behavior and events, in order to intervene if necessary. The network monitoring tools come in software or software-hardware form. The continuous network

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later