We’ve talked about a wall approach on this site and we’ve talked about an immune system approach to security. Both of these approaches have their valid [...]
The idea of smart contracts has been around since the 1990s, but recently the implications for their use for criminal activity has come under scrutiny of [...]
Smartwatches are the definition of science fiction becoming reality. They are becoming part of our daily lives more and more, and wearable computers are the [...]
How do you type? Do you type in the same way, every time you type your email address, your password? Chances are, you do. Chances are, you use a pattern, which [...]
“Advanced threats and cybercrime will persist in this mobile-first, cloud-first era, but at Microsoft we remain committed to helping our customers protect [...]
The image of ”The Hacker” used to be well defined: He (rarely she) is an introvert, a shy genius who sits in a darkened basement, with 25 screens in front [...]
Newest fraud scam recently discovered by IBM security researchers, scamming scheme run by Eastern European cyber criminals. What is special about this [...]