Acting as a cyber-security defense line, user behavior analytics (UBA) consist of monitoring the human behavior patterns that emerge from interacting with an IT system, establishing the normal zone and identifying any anomalies that could signal vulnerabilities or threats. This behavior-focused
Wireless or radio frequency wireless jamming designates the intentional activity of disrupting radio signals in order to disable any transmission that uses radio waves to circulate data or commands to and from RF devices. When used for malicious purposes, this wireless jamming is actually a DDoS
Let’s open our Dark Web discussion with a question: just how much of the entire Internet would you think is accessible via the usual search engines? Take a wild guess. We have conducted our own mini-inquiry based on this question, and the answers we received ranged from 20 to 40 percent. Well,
On June 15, 2015 the Consumer Watchdog group from Santa Monica, CA addressed a petition to the FCC regarding the way “edge” providers honor the “do not track request”. By “edge providers” the group has in mind entities such as Google, Facebook, YouTube, Pandora, Netflix, or LinkedIn. The “do not
The encryption debate reads the following way: while the logic of cyber-security and its encryption tools forecasts an impenetrable encryption, the government is worried that such an efficient cyber feature would block the law enforcers. Although creating a relative paradox, the diverging opinions
A survey on smart home and cyber-security, entitled “Behind our Digital Doors: Cybersecurity and the Connected Home”, revealed among other facts that 67% of the respondents possess between 1 and 5 Internet connected home devices, while 30% have 6 or more devices and 5% of households have 11 or more