Cyber attacks are increasing over the holiday season – we’ll have a detailed look at how these types of attacks work, using several examples.
Last updated on August 2nd, 2022 at 08:42 am
Metropolitan areas in the US have been hit with flash mobs of thieves. Technology already in place could seriously blunt these crimes. The question is whether the shoppers and retailers are ready to take responsibility for using it.
Last updated on January 28th, 2022 at 09:21 amWhat a year 2021. In terms of (successful) cyber attacks one of the most challenging years ever.
By now, most people have probably heard of 5G and the impact it will have. From a cybersecurity viewpoint, this upgrade of the IoT means devices are built less secure. This has raised concerns from many speculators, including military, governments. Cyber Protection Magazine interviews Dan DeBaun and Wilson Bautista about the technology they came up with to address these concerns.
Something unusual for Christmas from Cybersecurity-Magazine: our first book review. “Het Virus” by Eddy Willems and Alain Dierckx.
Happy Holidays from Cybersecurity Magazine!
The security concerns of the 2020 election brought digital security to the forefront of the Western world’s attention and the buzz phrase “zero trust” went from tech company lip service to an actual technology feature. And for good reason. The biggest problem in digital security is not technological but human. People just didn’t want to make the effort to keep their data secure.
The Krebs incident in the USA and a discussion of encryption backdoors in the EU will make life for cybersecurity harder. A commentary.
Last updated on March 9th, 2021 at 07:45 amThis is part 2 of our series of articles on OSINT. Find all articles here. OSINT is
Last updated on March 9th, 2021 at 07:47 amThis is part 3 of our series of articles on OSINT. Find all articles here. As the