Latest stories

  • in

    Unfortunately, the IFA 2021 exhibition has been canceled.

    the pc show it exhibition and showcase

    Unfortunately, the IFA 2021 exhibition has been canceled. In mid-April, many people felt the need to sit down and take a deep breath after hearing the news that Europe’s largest tech exhibition will be held in early September this year despite the pandemic. Of course, the organizers have declared that they intend to introduce strict […] More

  • in

    Samsung shows off its brand new display technology. (Video)

    spain telecom mwc lg samsung mobile

    After some earlier pictures, Samsung also released a video of what the new foldable displays would look like in use. It looks shockingly good! Earlier this week, Samsung unveiled its plans for foldable displays and released a video to go along with the announcement. As well as the classic foldable smartphone, the presentation includes a […] More

  • in

    Apple may be developing a mighty 40 core processor

    waiting for the new mac pro

    Apple may be developing a 40 core processor, which will be the heart of the most powerful Mac Pro up to date. According to Bloomberg, Apple may equip the future Mac Pro with a notably more powerful processor than before. When the announcement was made that apple would be developing its own processor for Macs, […] More

  • in ,

    The Internet gets faster with Wi-Fi 6 and 5G

    5g and WiFi 6

    Technology continues to evolve rapidly, and we are doing our best to keep up with the latest trends. Therefore, we will increase the number of devices in our mobile and wireless networks. The increase in traffic and the demand for better performance have driven us to evolve and find better and more efficient ways to […] More

  • in

    Why Social Engineering is Still a Big Problem in 2021

    29322722 worried businessman sitting at desk with laptop

    Social engineering is one of the most commonly used methods of stealing information from individuals and businesses alike. This is a form of cyberattack that is usually difficult for a user to recognize because it mostly relies on human interaction rather than computer code. The most important thing to remember about this method of attack […] More

  • in

    Coalition Against Apple Tax 

    kZygmYdOXMCCqIqmSMIY

    An industry coalition is organized by developers and studios that object to specific terms of Apple’s App Store.    The founders of the App Fairness coalition include Epic Games, Spotify, and Deezer, among others.    Companies object to some aspects of Apple’s app marketplace, the App Store, are objecting to some elements of its mandatory […] More

  • in

    Internal data theft reported at Shopify.

    pexels karolina grabowska 4968391

    One of the largest e-commerce platforms, Canadian Shopify, reported a data breach involving 200 webshops and its customers. An unspecified number of customers’ data may have been compromised after two internal employees from Shopify, one of the largest e-commerce platforms, tried to steal the user databases and transaction records of about 200 webshops. According to […] More

  • in

    Top 3 Cyber Threats Of 2018

    composite image of man in hood jacket hacking a laptop

    2018 saw the emergence of new malware, ransomware and other innovative ways of exploiting vulnerabilities in cyber systems. Here a few of the cyber threats that defined the year. VPNFilter VPNFilter is a malware program which is believed to have been developed by Fancy Bear APT Group. The malware has been hiding in a number […] More

  • in ,

    Future Considerations

    Future Considerations

    Strategic Cybersecurity, Module 15: Future Considerations. This final lecture of the course “Strategic Cybersecurity” discusses topics for students to consider in the future. The module focuses on three primary concerns: the need for cybersecurity analysis to be interdisciplinary in nature, the adversarial realm that is concerned with destroying data due to perceived diplomatic slight, and […] More

  • in ,

    Critical Infrastructure

    Critical Infrastructure

    Strategic Cybersecurity, Module 14: Critical Infrastructure. The U.S. government’s approach to protecting critical infrastructure from physical and cyber attacks has evolved over the past half-century, with presidential administrations creating various entities to better protect the country’s infrastructure. This lecture discusses this history and discusses the creation of Information Sharing and Analysis Centers, or ISACs. The […] More

  • in ,

    Economics, Government Regulation, and Cybersecurity

    Economics Government Regulation and Cybersecurity.

    Strategic Cybersecurity, Module 13: Economics, Government Regulation, and Cybersecurity. Cybersecurity may be considered both a public and a private good, requiring cooperation and collaboration between the public and private sectors. This can be difficult, given the private sector’s typical suspicion of government assistance. This lecture discusses economics and government regulation in achieving cybersecurity. The Objectives […] More

Load More
Congratulations. You've reached the end of the internet.