We’ve talked about a wall approach on this site and we’ve talked about an immune system approach to security. Both of these approaches have their valid [...]
It feels like science fiction. Still, after all these years, it feels like sceince fiction. Cyber Warfare. Yet, this concept which comes so easy to us when we [...]
Your toaster lets your kettle know that the bread is almost toasted to brown perfection, so this is the time to start boiling that water so it will be ready [...]
Smartwatches are the definition of science fiction becoming reality. They are becoming part of our daily lives more and more, and wearable computers are the [...]
Digital Computing is easy. The Turing Machine (which is, arguably, one of the basics of modern computers) has two settings: 1 and 0. Quantum computers can do [...]
How do you type? Do you type in the same way, every time you type your email address, your password? Chances are, you do. Chances are, you use a pattern, which [...]
The image of ”The Hacker” used to be well defined: He (rarely she) is an introvert, a shy genius who sits in a darkened basement, with 25 screens in front [...]
We thought the day and age for the good old Radio signals were done and dusted, didn’t we? Long gone are the days, when we had to tune in to find the [...]
Seven startup projects were competing for the prize of $10,000 in the I.e.* startup competition on May 5th. Chris Sullo, distinguished security expert who [...]