#01 An FBI Hacking Campaign Targeted Over a Thousand Computers In order to fight what it has called one of the largest child pornography sites on the dark [...]
We’ve talked about a wall approach on this site and we’ve talked about an immune system approach to security. Both of these approaches have their valid [...]
It feels like science fiction. Still, after all these years, it feels like sceince fiction. Cyber Warfare. Yet, this concept which comes so easy to us when we [...]
Your toaster lets your kettle know that the bread is almost toasted to brown perfection, so this is the time to start boiling that water so it will be ready [...]
Back in March 2015 first first malware infection of iPhones came to light: The Apple App Store was hacked. Back then, it was assumed that only 39 apps had been [...]
The idea of smart contracts has been around since the 1990s, but recently the implications for their use for criminal activity has come under scrutiny of [...]
Smartwatches are the definition of science fiction becoming reality. They are becoming part of our daily lives more and more, and wearable computers are the [...]
Digital Computing is easy. The Turing Machine (which is, arguably, one of the basics of modern computers) has two settings: 1 and 0. Quantum computers can do [...]
How do you type? Do you type in the same way, every time you type your email address, your password? Chances are, you do. Chances are, you use a pattern, which [...]