One of the most basic practices every cybersecurity guide will recommend is not to click on links and attachments contained in emails coming from unknown sources, and to think twice even if they come from seemingly trustworthy sources.
You think it’s unnecessary caution? Ask John Podesta, chairman of Hillary Clinton’s presidential elections campaign. This is exactly how he (or the operator of his email account) gave away his accounts credentials to hackers. The breach led to a series of damaging and embarrassing leaks which might have cost his boss her chance of becoming president. Continue reading
The main takeaway from the buildup of developments in the cybersecurity landscape is that privacy is becoming a commodity. The CIA is spying on your phone. Hackers are breaking into your home. Your documents, emails, messages, can be intercepted. And Congress is empowering ISPs to pry into your communications.
Long story short, nothing remains secret.
Under such circumstances, encryption becomes your best friend, your last line of defense in protecting your information. Continue reading
If you think someone without your desktop login won’t be able to access your computer’s files, think again. Anyone with mediocre IT skills can take your your hard disk, plug it as a secondary drive to another computer, and extract your files.
So how can you protect your files from hackers?
One option would be to encrypt your sensitive files manually or avoid storing them on your computer altogether and lock them away in a safe cloud. An alternative is to use Full-Disk Encryption (FDE), a technique that scrambles everything stored on your computer and makes it only accessible to the person with the decryption key. Continue reading
Imagine scrolling an online news article by merely staring at the bottom of the webpage. How about reorganizing your desktop files by dragging them around with your gaze?
For years we’ve been using mice and keyboard (and later touch screens) as the main tools to control and send commands to our computers and devices.
But 2016 proved that things are headed for a change. With great leaps in artificial intelligence and machine learning, we saw a new array of highly efficient assistants and devices that can be controlled with voice commands.
The start of 2017 gave a hint at what the next breakthrough might be. Continue reading
Just as blockchain, the technology that underlies bitcoin and other cryptocurrencies, continues to show potential in transforming many industries, it is also showing its potential in the crowdfunding and investment domain.
Initial Coin Offering (ICO) has become a popular way to raise funds for projects that are based on blockchain and cryptocurrencies. An ICO is a cryptocoin crowdsale, where a blockchain-based project allows enthusiasts and supporters to invest in the project by purchasing part of its cryptocurrency tokens in advance. ICOs usually take place in the early phases of a project, and the raised funds are then used to pay development and launch expenses. Continue reading
We rely increasingly on messaging apps to carry out our daily communications, whether for personal use or to do business. And there are literally tons of them on the internet and app stores, each sporting different features and social reach.
Having messaging apps have become an inherent part of our lives, we often use them to exchange sensitive information without regard to how capable they are of keeping that information secure. With messaging apps, we share personal information and photos, or report on sensitive issues in countries where the internet is strictly controlled and monitored by autocratic regimes.
So just how secure and trustworthy is your favorite messaging app? Here are four criteria that will help you decide. Continue reading
Data analytics is something that you read and hear about a lot these days. It’s been touted as the science and technology that can help organizations reduce costs, increase efficiency, identify new opportunities and increase their competitive advantage.
Data analysts uses mathematics, statistics, and sometimes machine learning, to find meaningful patterns across registered data and turn them into meaningful results and actionable insights. While the concept of analytics isn’t new, recent advances in storage and computation technologies are enabling us to store and process data in huge volumes, and are taking data analytics to the next step, opening up possibilities that weren’t conceivable before. Continue reading