Apple AirPods
By Luke Fitzpatrick Image Credit: Pixabay Apple AirPods are incredibly reliable and give users as much quality sound as they need. Unfortunately, many users will run into...
Cloud security
By Oliver Pinson-Roxburgh, Alert Logic The decision to move to the cloud may seem an obvious one. It’s faster, more scalable, and more agile. However, security remains a concern, and rightly so. The foundational infrastructure delivered...
Crucial measures to make sure your online accounts are protected
laptop smartphone internet browsing
Google Chrome's Incognito window provides you with private browsing. But how far can you trust it?
machine learning security for developers
Even easy-to-use machine learning systems come with their own challenges. Among them is the threat of adversarial attacks, one of the important concerns of ML applications.
Account takeover (ATO) is quickly becoming a go-to vector for malicious actors. Here's how they do it and how you can prevent it.
Man in the middle attacks. Social engineering. Large scale data breaches. Government surveillance. Device theft. Those are just some of the threats standing in your way as you try to carry on a safe digital...
The Internet of Things (IoT) is fast expanding and encroaching on every aspect of our lives. There are already more than 4 billion connected devices across the world, and IoT devices will outnumber humans several...
artificial intelligence
By Elana Krasner Companies across industries are exploring and implementing artificial intelligence (AI) projects, from big data to robotics, to automate business processes, improve customer experience, and innovate product development. According to McKinsey, “embracing AI promises...
As more and more aspects of our lives become connected, we become more vulnerable to attacks. The latest data-breach at VTech toy store taught us that even our children are exposed to the vile deeds...