Editorial

Privacy versus Web analytics – the “do not track” issue
Editorial Privacy versus Web analytics – the “do not track” issue

On June 15, 2015 the Consumer Watchdog group from Santa Monica, CA addressed a petition to the FCC regarding the way “edge” providers honor the “do not track request”. By “edge providers” the group has in mind entities such as Google, Facebook, YouTube, Pandora, Netflix, or LinkedIn. The “do not

Should encryption be limited or encouraged?
Editorial Should encryption be limited or encouraged?

The encryption debate reads the following way: while the logic of cyber-security and its encryption tools forecasts an impenetrable encryption, the government is worried that such an efficient cyber feature would block the law enforcers. Although creating a relative paradox, the diverging opinions

Smart Home Invaders – just how vulnerable are we?
Editorial Smart Home Invaders – just how vulnerable are we?

A survey on smart home and cyber-security, entitled “Behind our Digital Doors: Cybersecurity and the Connected Home”, revealed among other facts that 67% of the respondents possess between 1 and 5 Internet connected home devices, while 30% have 6 or more devices and 5% of households have 11 or more

The EMV card and how to be almost safe
Editorial The EMV card and how to be almost safe

The EMV card comes with enhanced security features, but also with particular vulnerabilities. Since this type of credit cards has been utilized for a while in Europe and in other regions of the globe, the cyber-attackers have already developed various methods of bypassing the security features in

Social engineering in cyber-attacks – how to protect your company
Editorial Social engineering in cyber-attacks – how to protect your company

In our article on organizational doxing we mentioned social engineering with a promise on detailing this subject. The connection is straightforward – malicious digital entities use doxing as part of their social engineering maneuvers. However, what does social engineering mean? Social engineering

Multi-factor authentication – is your data protected?
Editorial Multi-factor authentication – is your data protected?

It often occurs in the aftermath of a severe data breach that cyber-security analysts talk about the attacked system as not being secured enough, because it did not use multi-factor authentication. Abbreviated MFA, multi-factor authentication is actually 2FA in most of the cases: two-factor

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later