It feels like science fiction. Still, after all these years, it feels like sceince fiction. Cyber Warfare. Yet, this concept which comes so easy to us when we [...]
Your toaster lets your kettle know that the bread is almost toasted to brown perfection, so this is the time to start boiling that water so it will be ready [...]
The idea of smart contracts has been around since the 1990s, but recently the implications for their use for criminal activity has come under scrutiny of [...]
How do you type? Do you type in the same way, every time you type your email address, your password? Chances are, you do. Chances are, you use a pattern, which [...]
The image of ”The Hacker” used to be well defined: He (rarely she) is an introvert, a shy genius who sits in a darkened basement, with 25 screens in front [...]
We use it every day, it is an integral part of our lives and for more than a decade now, it has grown to become as important to us as the coffee in the morning [...]
On April 13 some very creative cyber prankster(s) manage to exploit a security failure, or better to say weakness, with how Google monitors local listings. [...]