cybersecurity
Our personal, digital, national and military security depend on a safe cyber space.
Four Strategic Ways to Boost Cloud Security
Security in the cloud? Some companies see it as an oxymoron, but it’s simply a different way of looking at the same problem.
Janice SwinglePublished 3 years ago in 01A Certain Transparency
While the reputations of Cambridge Analytica and Facebook are being slaughtered in the news, the state of our privacy is being questioned. Are we too willing to give open ourselves up to Big Brother? What are the consequences of such an open society? Is such a society even open?
Harriet WestonPublished 3 years ago in 01How to Stop the Next Data Mega-Breach
When the consumer credit report agency Equifax suffered a data mega-breach, the information of 143 million Americans was compromised. Prior to then, eBay, Yahoo, and Target all also suffered breaches. And then there's the 2016 hacking of the US Election by Russia, which played a decisive role in putting Trump in the White House.
Ben KharakhPublished 3 years ago in 01Security Risks of Mobile Payments
Cellphones might just be one of the most useful inventions ever made. They have become our favorite tool to search up news, excellent roadmaps, and the most important form of communication people have with one another.
Cato ConroyPublished 3 years ago in 01How To Protect Your iCloud Account From Hackers
Your iCloud account is so convenient, isn't it? It's easy to use, allows you to have all your files backed up in a nice little bank, and even connects your account to a bunch of different devices. The iCloud is the ultimate way to safely store tons of things—or is it?
Riley Raul ReesePublished 3 years ago in 01How To Keep Someone from Snooping on Your Laptop
Even if you're doing absolutely nothing unusual on your laptop, nobody likes a snoop, or being snooped on. That's why there are plenty of ways to protect your personal files and history on your laptop with ease.
Olivia AmberPublished 3 years ago in 01How to Keep Your Home Wi-Fi Safe From Hackers
Cybersecurity is one of the single most important concepts for most router manufacturers and network designers. Reshaping the way our networks can be both faster and far better protected will be among many ways the internet is overall adapted in the next few years, but you won't have to wait that long to keep your home Wi-Fi safe from hackers. It has become much easier for hackers to break into firewalls, disrupt security measures, and burglarize your home system, what with the debilitating WPS feature and the need for enabling your firewall after set-up, knowing how to adapt to these threats is just how you can avoid them.
Salvador LorenzPublished 3 years ago in 01Spectre Attack
In the era of computer systems, time and performance is very important. To achieve that, computer scientists works hard to make CPUs better and faster. Most of the modern CPUs in present devices around the world make use of a performance feature called speculative execution. Speculative execution improves the performance of the CPU. It does that by guessing future tasks and executing the instruction. In normal cases, the task comes from the memory and it is executed by CPU, and results are stored in the storage. For better performance using speculative execution, the task is guessed by CPU and executed. When the task comes from memory, the CPU makes sure the correctness of its initial guess. If the guess was incorrect, the CPU reverts speculative execution. If the guess was correct, a significant performance gain is achieved.
Dharmang PatelPublished 3 years ago in 01Cybersecurity Predictions for 2018 You Should Know
In the 2010s, we have seen serious evolution when it comes to technology—both good and bad. We've seen the birth of the cryptocurrency boom, as well as a new birth requiring us to spot Bitcoin scams a mile away. We've even seen the booming growth of the Dark Web and some of the best black hat hackers in history make their marks.
Cato ConroyPublished 3 years ago in 01Smartest Ways to Hack Proof Your Phone
No matter how well President Trump may extend his diplomatic tirades into 280 characters or less, no button of any size can holistically thwart internet hacking. Your phone? That's a prime target, my friend. Think about this: while that neat touchscreen device may be, at its barest stage, a cellular phone for mass communication, it has obviously been enhanced over the years with cameras, internet connectivity, and background multi-app functionality only a few examples. If you don't have protection for your phone, whether it be a password management application or even some encryption program, safeguarding your internet documents and private information should be of utmost concern.
George HermanPublished 3 years ago in 01Facts about the Dark Web That Will Scare You
The dark web is made accessible by a software called The Onion Router. This software makes a person's presence on the internet virtually anonymous, which is what makes the dark web so nefarious. Most of the things you can do or find on the dark web you can also find in real life or on the deep net, but the dark web makes conducting suspicious activity much easier.
Dr. Ethan LeviPublished 3 years ago in 01Cryptography: A Whole New World
You may be wondering what exactly this article is, and what cryptography is. That's what I am trying to tell you here. Cryptography is everywhere, and in a sense, it's the only way for people to remain completely private about certain things. Cryptography is a lock you put on your information that only you have the key to. The word Cryptography comes from the Greek Kryptos, meaning secret, and -ography meaning the study of. The study of secrets.
Kryptos JournalPublished 3 years ago in 01