cybersecurity
Our personal, digital, national and military security depend on a safe cyber space.
How to Avoid Cyber Threats While at FIFA World Cup 2018?
The 2018 FIFA World Cup is just around the corner. In just a few days, on Thursday, June 14th, the biggest football tournament in the world will take center stage in Russia. Even though such events bring national pride and enjoyment, cybersecurity experts warn that fans at the World Cup might be attractive targets for hackers.
By Laura Tyrell8 years ago in 01
A Certain Transparency
While the reputations of Cambridge Analytica and Facebook are being slaughtered in the news, the state of our privacy is being questioned. Are we too willing to give open ourselves up to Big Brother? What are the consequences of such an open society? Is such a society even open?
By Harriet Weston8 years ago in 01
How to Stop the Next Data Mega-Breach
When the consumer credit report agency Equifax suffered a data mega-breach, the information of 143 million Americans was compromised. Prior to then, eBay, Yahoo, and Target all also suffered breaches. And then there's the 2016 hacking of the US Election by Russia, which played a decisive role in putting Trump in the White House.
By Ben Kharakh8 years ago in 01
How To Protect Your iCloud Account From Hackers
Your iCloud account is so convenient, isn't it? It's easy to use, allows you to have all your files backed up in a nice little bank, and even connects your account to a bunch of different devices. The iCloud is the ultimate way to safely store tons of things—or is it?
By Riley Raul Reese8 years ago in 01
How to Keep Your Home Wi-Fi Safe From Hackers
Cybersecurity is one of the single most important concepts for most router manufacturers and network designers. Reshaping the way our networks can be both faster and far better protected will be among many ways the internet is overall adapted in the next few years, but you won't have to wait that long to keep your home Wi-Fi safe from hackers. It has become much easier for hackers to break into firewalls, disrupt security measures, and burglarize your home system, what with the debilitating WPS feature and the need for enabling your firewall after set-up, knowing how to adapt to these threats is just how you can avoid them.
By Salvador Lorenz8 years ago in 01
Spectre Attack
In the era of computer systems, time and performance is very important. To achieve that, computer scientists works hard to make CPUs better and faster. Most of the modern CPUs in present devices around the world make use of a performance feature called speculative execution. Speculative execution improves the performance of the CPU. It does that by guessing future tasks and executing the instruction. In normal cases, the task comes from the memory and it is executed by CPU, and results are stored in the storage. For better performance using speculative execution, the task is guessed by CPU and executed. When the task comes from memory, the CPU makes sure the correctness of its initial guess. If the guess was incorrect, the CPU reverts speculative execution. If the guess was correct, a significant performance gain is achieved.
By Dharmang Patel8 years ago in 01
Cybersecurity Predictions for 2018 You Should Know
In the 2010s, we have seen serious evolution when it comes to technology—both good and bad. We've seen the birth of the cryptocurrency boom, as well as a new birth requiring us to spot Bitcoin scams a mile away. We've even seen the booming growth of the Dark Web and some of the best black hat hackers in history make their marks.
By Cato Conroy8 years ago in 01












