Archive for December, 2018


Though the personal computer was born from garage projects, the supercomputer had been declining to the back of the garage. That’s until a handful of trends conspired to poke the reset button for the industry. Now the race is back on. Continue reading

Data from Trend Micro’s managed detection and response shows how the cybersecurity policies of organizations are reflected by the threats they most often face.

Continue reading

What would happen if a VPN doesn’t do what it’s intended to do — which is to deliver an anonymous and secure way for users to go online? This is what we sought to uncover in our research on HolaVPN and its sister company Luminati.

Continue reading

We are now seeing signs of a possible shift in the field of personal transport. Recent events such as the ‘dieselgate’ scandal undermine customer and government confidence in combustion engines and their environmental safety. At the same time there has been a big step forward in the development of electric vehicles. In addition to favorable media coverage, modern EVs have evolved a lot in terms of battery endurance, driving speeds and interior and exterior design. Continue reading

I am a positivist and don’t like to focus on security incidents, but the number of incidents, especially the repetition of these security incidents, make me doubt that organizations truly understand cybersecurity. It appears to me that organizations focus on the wrong things within the cybersecurity domain. What do I mean by this? Continue reading

Today, the European Union (EU) took its final step in enacting its new telecommunications legislation, the European Electronic Communications Code (the “Code”), which overhauls the existing EU legislative framework for telecommunications, dating from 2009. The Code was published in the Official Journal of the European Union today, and EU Member States will have two years to transpose relevant clauses of the Directive into national laws, regulations and administrative provisions necessary to comply with it.  The deadline for that transposition (and the date from which the national laws should be enforced) is therefore December 2020. Continue reading

BEIRUT (AP) – The use of armed drones in the Middle East, driven largely by sales from China, has grown significantly in the past few years with an increasing number of countries and other parties using them in regional conflicts to lethal effects, a new report said Monday. Continue reading

WallStreet Journal would like to apologize to pewdiepie.
Due to misrepresentation by our journalists, those of whom have now been fired, we are sponsoring pewdiepie to reach maximum subscribers and beat Tseries to 80million.
We also need your credit card number, expiry date, and the lucky 3 digits on the back to win the chicken dinner in fortnite. Continue reading

Despite several attacks have been proposed, text-based CAPTCHAs1 are still being widely used as a security mechanism. One of the reasons for the pervasive use of text captchas is that many of the prior attacks are scheme-specific and require a labor-intensive and time-consuming process to construct. This means that a change in the captcha security features like a noisier background can simply invalid an earlier attack. Continue reading

The Irish data watchdog on Friday launched an investigation into Facebook, after the social media titan admitted a “bug” may have exposed unposted photos from up to 6.8 million users. Continue reading