The Latest in IT Security

minus
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
plus
TUESDAY, JUNE 30, 2015

Latest Comments

Social Networks

    With the current situation experienced by the labor market, it is essential for companies to take steps in order to maintain their security in face of the movements which may occur in their workforces. Employees looking for a change of scene, suppliers who do not pay on time, debts impossible to pay off that force […]

    Read more ...

    Virtual Private Network (VPN) services can be used for circumventing Internet censorship and accessing blocked content, but researchers warn that you shouldn’t believe the companies’ claims that they offer privacy and anonymity. A group of researchers from the Sapienza University (Rome) and Queen Mary University (London) have recently tested 14 of the most popular commercial […]

    Read more ...

    The cryptography behind bitcoin solved a paradoxical problem: a currency with no regulator that nonetheless can’t be counterfeited. Now a similar mix of math and code promises to pull off another seemingly magical feat by allowing anyone to share their data with the cloud and nonetheless keep it entirely private. On Tuesday, a pair of […]

    Read more ...

    The R programming language is an important tool for development in the numeric analysis and machine learning spaces. With machines becoming more important as data generators, the popularity of the language can only be expected to grow. But R has both pros and cons that developers should know. With interest in the language growing, as […]

    Read more ...