Less than 48 hours after the killing of Iran’s General Qasem Soleimani, the U.S. Department of Homeland Security issued a bulletin calling out Iran’s “robust cyber program,” and cautioning everyone to be prepared for Iran to “conduct operations in the …
Around the world, the millions of internet-connected gifts we exchanged over the holidays have been set up, making our homes “smarter.” And less secure.
The new year is a time for reflecting on the old and considering the new. In cybersecurity, this leads to a prediction-fest where vendors tell us what to expect over the next 12 months.
The end-of-year online buying season is a bank fraud frenzy. This used to be done by criminals using stolen or cloned payment cards in person, via card-present (CP) fraudulent transactions. The introduction of chip-based Europay, Mastercard, and Visa (…
For decades, the cornerstone of IT security has been Public Key Infrastructure, or PKI, a system that allows you to encrypt and sign data, issuing digital certificates that authenticate the identity of users.
Some 20 years ago, the founders of Amazon and Google essentially set the course for how the internet would come to dominate the way we live.
I would like to take a step back to take in a broader, bigger picture than usual in this article, moving across time as well as into the legal sphere. Technology isn’t just hardware and software; it’s a fundamental component of every aspect of our live…
A pair of malicious activities have become a stunning example of digital transformation – unfortunately on the darknet.
Drones, the popular name for unmanned aerial vehicles (UAVs), are a new toy for hobbyists, a tool for commerce, and a multi-purpose device for the military.
“There are just too many things we have to think about every day, too many new things we have to learn. New styles, new information, new technology, new terminology … But still, no matter how much time passes, no matter what takes place in the interim,…