Description
a look at encryption, and it's importance in computer science and cyber security (privacy, etc)
Shlomi Dolev Contributor Shlomi Dolev is the Chair Professor and founder of the Computer Science department of Ben-Gurion University of the Negev. ... (2018)
Developing secure, robust web applications in the cloud is hard, very hard. If you think it is easy, you are either a higher form of life or you ha... (2017)
Restaurant guide Zomato got off lightly after a hacker grabbed 6.6M user passwords (2017)
Wall Street Journal, 2017: "Two months after Equifax reported one of the worst data breaches in history, its interim chief executive told a congre... (2017)
LastWeekTonight, 2017: "John Oliver discusses the massive impact of the cybersecurity breach at Equifax and their massively misguided attempts to m... (2017)
Application container technologies, also known as containers, are a form of operating system virtualization combined with application software pack... (2017)
Inc.com 2017 Last week's Uber breach is only the tip of the iceberg. Standard security is broken for good (and what you can do about it). (2017)
A hacker lifted $80 million in digital currency from the DAO, showing the dangers of programmable money. A huge digital heist is a reminder that w... (2018)
We are 10 years into a war. A war most people don’t realise is happening, and which our governments are only just beginning to see. This is the Gre... (2017)
Putting the burden on employees isn’t the answer. "Gartner expects worldwide spending on information security to reach $86.4 billion in 2017, gr... (2017)
Maybe Better If You Don’t Read This Story on Public WiFi We took a hacker to a café and, in 20 minutes, he knew where everyone else was born, wh... (2014)
Schools in DeKalb County, Ga., see as many as 3,000 cyberattacks a day, according to the team trained to defend against them. (2018)
The country’s crime classification system is antiquated. Police commanders struggle with no data on an array of technology-based crimes. (2018)
Election officials have insisted that machines can’t be remotely compromised because they’re not “connected to the internet.” But security experts ... (2018)
Enterprising cryptocurrency enthusiasts have found a way to use your computer processor and electricity to make themselves money. What is cryptojac... (2018)
As stated in our guide "What is Blockchain Technology?", there are three principal technologies that combine to create a blockchain. None of them a... (2017)
In an age of nonstop breaches and hacks, here are ways to improve your online security based on your level of risk, from average user to NSA contra... (2018)
Telegram has reached 200 million monthly active users. More than 500,000 new users join daily. Telegram became the first messaging app to roll o... (2018)
The 'entangled' light particles spookily interact with each other at huge distances. (2018)
In recent days, the VPNFilter malware has attracted attention, much of it in the wake of a May 25 public service announcement from the FBI, as well... (2018)
The nightmare is easy enough to imagine. Nefarious baddies sit in a dark room, illuminated by the green glow of a computer screen. Meanwhile, techn... (2018)
The Georgia Institute of Technology has announced a new online cybersecurity master’s degree that will be offered for less than $10,000 and deliver... (2018)
Coinbase is advancing its push into developing a secure digital identity platform by acquiring San Francisco-based startup Distributed Systems. (2018)
The DEF CON hackathon highlights the real threats malicious hackers pose to our democracy. (2018)
The hotel chain says details of up to 500 million guests may have been accessed in a database breach. (2018)
Fifteen years ago, cybersecurity could be boiled down to a simple strategy: Secure the perimeter. Experts fought against malware and other nefariou... (2018)
Comes with everything you need to understand complete systems such as SSL/TLS: block ciphers, stream ciphers, hash functions, message authenticatio... (2018)
Immersive Labs, a cybersecurity skills platform founded by former GCHQ researcher James Hadley, has raised $8 million in Series A funding. Leading ... (2019)
A VPN is a tunnel connecting two different networks. You throw traffic into one end of the tunnel, and it will come out somewhere else, even if the... (2019)