#01 An FBI Hacking Campaign Targeted Over a Thousand Computers In order to fight what it has called one of the largest child pornography sites on the dark [...]
We’ve talked about a wall approach on this site and we’ve talked about an immune system approach to security. Both of these approaches have their valid [...]
It feels like science fiction. Still, after all these years, it feels like sceince fiction. Cyber Warfare. Yet, this concept which comes so easy to us when we [...]
Your toaster lets your kettle know that the bread is almost toasted to brown perfection, so this is the time to start boiling that water so it will be ready [...]
The idea of smart contracts has been around since the 1990s, but recently the implications for their use for criminal activity has come under scrutiny of [...]
Smartwatches are the definition of science fiction becoming reality. They are becoming part of our daily lives more and more, and wearable computers are the [...]
Digital Computing is easy. The Turing Machine (which is, arguably, one of the basics of modern computers) has two settings: 1 and 0. Quantum computers can do [...]
950 million (and potentially over 1.1 billion) Android phones are vulnerable to a series of hacks, which include DOS, UI spoofing and stealing of user [...]
We thought the day and age for the good old Radio signals were done and dusted, didn’t we? Long gone are the days, when we had to tune in to find the [...]