Tags » cyber security

Next »
Posts
blockchain and refugees
http://blog.stcloudstate.edu/refugeesandmigrants/2018/09/20/blockchain-for-refugees/ As Norwegian Refugee Council research More)
Cybersecurity Risks in schools
FBI Warns Educators and Parents About Edtech’s Cybersecurity Risks By Tina Nazerian     Sep 14, 2018 More)
Encyclopedia of Criminal Activities and the Deep Web
>>>>>>> Publishing Opportunity <<<<<<<<<<<<<< Encyclopedia of Criminal Activities and the Deep Web Countries all over the world are seeing significant increases in criminal activity thr (More)
Data Lake
What is a Data Lake? A Super-Simple Explanation For Anyone September 6, 2018 Bernard Marr https://www.linkedin.co (More)
human nature cybersecurity
Keynote: Cybersecurity Awareness Is Dead! Long Live Cybersecurity Awareness! Tuesday, August 21 | 12:05pm - 12:30pm ET | More)
thermal imaging
***** thank you Tirthankar ! ******* : https://www.linkedin.com/feed/update/urn:li:activity:6424443573785235456 Recovering Keyboard (More)
Putin's game
What Putin Really Wants Russia's strongman president has many Americans convinced of his manipulative genius. He's really just a gambler who won big. More)
hacking phone
Hackers may be able to tap into your office phone https://www.facebook.com/techinsider/videos/909575759240781/ +++++++++++++++++++++ more (More)
Meltdown and Spectre
Meltdown and Spectre Bugs in modern computers leak passwords and sensitive data. https://meltdownattack.com/ ++++++ more on cybersecurity in this IMS blog More)
Mac OS High Sierra
ANYONE CAN HACK MACOS HIGH SIERRA JUST BY TYPING "ROOT" ANDY GREENBERG 11.28.17 05:47 PM https://www.wired.com/story/macos-high-sierra-hack-root/More)
Next »
Skip to toolbar