As some of you may have noticed in different occasions, sometimes our Internet interactions come up as puzzling experiences. For example, I spotted this foreign-sounding words in the denomination of a Facebook image whose link I received while being logged out of my account: Beveiligingscontrole.
Macro in computing represents a set of rules or patterns that match a certain input sequence to a specific output sequence, thus serving in automating software functions. They are essentially time-saving ways of launching repetitive tasks, and many organizations need to employ macros on a daily
What should a company mark down as ‘done’ when it comes to a strong cyber-defense internal policy that also depends of its employees, besides using the right software tools? Cyber awareness policies, obviously. We have previously approached the recommended organizational cyber-strategies when it com
Ignorance is bliss. As much as it may have banked the wisdom of ages, this saying does not apply in cyber-security. Having your employees blissfully unaware of the risks, vulnerabilities and dangers lurking behind their interactions with technology can prove extremely costly over time. Human
In what anonymity networks are concerned, all discussions revolved so far around Tor, its characteristics, its Dark Web gateway providing quality and its crucial role in tracking criminals in a few famous cases. Now that MIT researchers developed the Riffle network, dedicated to a similar type of
Although a lot of unflattering virtual ink has been consumed to characterize hackers and many alarming things have been said about their skills, it is however incontestable that these people are extremely gifted, IT-wise. Turning the hackers’ talent toward law-abiding activities can prove a very u