Categories » Cybersecurity

Next »
SIM jacker
+++++++++ more on hackers in this IMS blog (More)
second-factor authentication
This is why security keys, not SMS, is the proper second-factor authentication. (App authenticators are better than SMS but still prone to phishing). Some young one may well have walked into a store saying "hi, I'm Jack Dorsey" with a fake-crap ID (More)
surveillance tourists phones
+++++++++++ more on surveillance in this IMS blog (More)
facial recognition banned
+++++++++++++ more on surveillance in this IMS blog (More)
Huawei backdoor More)
Huawei funded by Chinese Military
CIA Offers Proof Huawei Has Been Funded By China's Military And Intelligence Zak Doffman More)
digital transformation online professional education
<h3 ">Sharpen the digital transformation strategy for your business. Enroll today in Digital Transformation: From AI and IoT to Cloud, Blockchain, and Cybersecurity More)
Blurred Lines Between Security Surveillance and Privacy
Edtech’s Blurred Lines Between Security, Surveillance and Privacy By Tony Wan     Mar 5, 2019 More)
Russia disconnect Internet
Russia Is Considering An Experiment To Disconnect From The Internet February 11, 20194:50 PM ET  SASHA INGBER More)
secure and anonymous communication tools
Down the Security Rabbit Hole The most secure and anonymous communication tools available David Koff August 27 2018 https://med (More)
Next »
Skip to toolbar