2018’s Biggest Security Breaches and What to Worry about in 2019

By David Balaban
The clock ticking its way to midnight. On New Year’s Eve, a lot of people hope only the best things will happen in 2019. There were though plenty of things to complain about last year. One of the biggest issues seemed to be the massive… Continue reading 2018’s Biggest Security Breaches and What to Worry about in 2019

Is Flawless Anonymity Possible?

By David Balaban
The condition of being anonymous is called anonymity – Let’s suppose you want to post the most anonymous comment on a social network imaginable. What kind of an instrument do you need for that? VPN? Tor? SSH tunnel? In fact, none… Continue reading Is Flawless Anonymity Possible?

Taking Care of Your Personal Online Security (For Paranoids)

By David Balaban
We live in a world where anonymity and online privacy are impossible things. Your phone calls can be tapped, smartphone data can be stolen, and even the camera and microphone can be turned on remotely. You can be watched from the satel… Continue reading Taking Care of Your Personal Online Security (For Paranoids)

Understanding VPN through open systems interconnection model

By David Balaban
VPN is a wonderful thing that you all have probably heard about. I assume it was something like this: “Using a VPN you can visit websites blocked by state services and engage in any network activity without fear of revealing your actua… Continue reading Understanding VPN through open systems interconnection model

Elite North Koreans aren’t opposed to exploiting internet for financial gain

By David Balaban
According to a report from Recorded Future, it seems the ruling elite in North Korea are now using the Internet more and more to take advantage of money-making opportunities and avoid various economic sanctions. Not only is the Kim reg… Continue reading Elite North Koreans aren’t opposed to exploiting internet for financial gain

Third-Party Apps May Read Your Email: Learn How to Protect

By David Balaban
Sad news about the unauthorized viewing of email messages by third-party application developers has alarmed Gmail users. It’s understood the Internet giant did not resort to ignoring the problem, the corporation provided detailed comme… Continue reading Third-Party Apps May Read Your Email: Learn How to Protect

Air-conditioned apocalypse: A blackout scenario involving smart climate control devices

By David Balaban
Science fiction movies often depict various situations related to cybercriminals’ activity. These can include predicaments where threat actors disrupt the transportation system of a large city or cause power outages in entire regions. … Continue reading Air-conditioned apocalypse: A blackout scenario involving smart climate control devices

Blockchain Vulnerabilities: Imperfections of the Perfect System

The whole cryptocurrency and blockchain craze has attracted both fans and critics of the new tech, but the flip side is that it has lured cybercrooks, too. After Bitcoin prices reached the…
Go on to the site to read the full article
The post Blockcha… Continue reading Blockchain Vulnerabilities: Imperfections of the Perfect System