The Latest in IT Security

1

Browsing anonymity may seem appealing for various reasons. Regardless of whether they have something worth hiding/protecting or not, those who know better appreciate the value of online privacy protection. But is VPN-supported anonymity all it is rumored to be, or not? A study coming from a joint Princeton and Stanford researcher team seems to prove […]

Read more ...

1

Ransomware as a service, (RaaS), lets malicious parties use predefined malware, in order to extort their victims of choice. Available online, these cyber crime – to lease – deals are making the digital environment even worse.

Read more ...

1

Cyber security automation may represent a relief for specialists. With its unmatched potential of big data processing, automation in this field is the only foreseeable counteraction once the global-scale Internet of Everything provides a new playing field for hackers everywhere

Read more ...

1

What happens to the victims of data theft, once hackers get hold of their identity? We were tempted to say “digital identity”, but that would not have been complete. Once the personally identifiable information (PII) or sensitive personal information (SPI) is in the hands of malicious entities, it can affect the real-life identity of the […]

Read more ...

Categories

THURSDAY, FEBRUARY 23, 2017

Featured

Archives

Latest Comments

Social Networks