Editorial

Stopping online advertising fraud once and for all
Editorial Stopping online advertising fraud once and for all

In late 2014 the American Association of Advertising Agencies (4A’s), Association of National Advertisers (ANA), and Interactive Advertising Bureau (IAB) created the New York-based Trustworthy Accountability Group (TAG) for the purpose of “eliminating fraudulent digital advertising traffic, com

Help improve safety in case of power grid cyber-attacks!
Editorial Help improve safety in case of power grid cyber-attacks!

The December 2015 Ukraine cyber-attack that took control of the Prykarpattyaoblenergo Control Center (PCC) in the Ivano-Frankivsk region serves as study-case for all cyber-security researchers concerned with possible similar incidents in the US. The said APT attack was performed via a malware

How DARPA crushed the hopes for touch-based authentication
Editorial How DARPA crushed the hopes for touch-based authentication

Smartphones head towards touch-based continuous authentication – a type of permanent identity validation that is also passive, since it does not hinder in any way other human-phone interactions that may be taking place during the same time. That would eliminate the risks of intrusion currently at t

Find out the basics on the most famous mobile payment systems
Editorial Find out the basics on the most famous mobile payment systems

While a recent report coming from the Institute of Electrical and Electronics Engineers shows that according to nearly 1400 tech enthusiasts (out of 2000 surveyed) mobile payment is sure to take over the payment market and clearly will surpass cash and credit cards by the year 2030, other online

Is homomorphic encryption the ultimate in cloud security?
Editorial Is homomorphic encryption the ultimate in cloud security?

The simplest way to describe homomorphic encryption would be the following: HE is the particular type of converting data into cipher text that allows this encrypted data to further get analyzed, permuted, associated to, and generally used into various computations without any decryption involved.

Network events monitoring – enjoy an useful cyber-sentinel
Editorial Network events monitoring – enjoy an useful cyber-sentinel

In-depth cyber defense sees the process of stopping attacks as being only half of the protection activity. Going to the roots of the incident or of the event and thus preparing the system in order to fend off future similar situations is the subsidiary defense move that completes any cyber-shield.

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later