1. adamwright

    On Sale! 5 Year Plan of FastestVPN for $28.49

    Just stumbled upon this VPN deal. FastestVPN is giving away a further 5% discount on its current Winter sale - So that's a 5% additional discount on top of the existing 95% discount. To activete code you need to enter "winter18" in the coupon field. That's almost USD 0.5 per month. Pretty decent...
  2. Parsh

    Q&A 2017 and Ahead | The 29th World "Computer Security Day"

    The 30th of November marks the 29th Computer Security Day ━ an unofficial holiday used to raise awareness of Cybersecurity issues that affect us all. At the most basic level, people across the world are encouraged to take the opportunity to create new strong passwords (a major and neglected...
  3. Andra Zaharia

    Is Internet Security a Losing Battle? - What the Experts Say

    One of the most thrilling projects I've worked on for the Heimdal blog is this roundup. :D The topic was proposed by one of readers and the experts who participated passionately shared their perspective on this hot topic.There are 32 of them and I know that some are quite long, but I assure you...
  4. Logethica

    UK: 14% of 18-24 year olds have browsed "Dark Web"

    THE 2016 KENT CYBER SECURITY SURVEY: "This is the Third Edition of the traditional Kent Cyber Security Research Centre’s Annual Survey. In it, we try to get responses and figures from the UK public to assess their experiences, practices and opinions regarding a number of cybersecurity related...
  5. Logethica

    Current RF: Recycle Energy & Increase Cyber-Security

    Current RF: Recycle Energy & Increase Cyber-Security- SOURCE: cvbj.biz (ARTICLE DATE: 1 Sep 2016) One potentially groundbreaking innovation comes from Current RF, which produces chips that reduce energy emissions from electronic devices. It also recycles the energy that does come out and...
  6. Logethica

    Surveillance & Big-Data Vs Security & Privacy

    Surveillance & Big-Data Vs Security & Privacy: Writing of cyber attacks,Phillip Bobbitt author of "The Shield of Achilles" & "The Garments of Court and Palace", notes that by “virtually abolishing civil privacy or by increasing surveillance and intelligence gathering,” countries can defend...
  7. SpartacusSystem

    Security Alert Cloud Use Increases Attack Surface, But Security Not Keeping Up

    Moving workloads to the cloud dramatically increases an organization's attackable surface area, which is causing a headache for IT departments because security hiring has not kept up with demand, according to a new survey. The research was carried out by CloudPassage at this year’s Black Hat...
  8. SpartacusSystem

    Security Alert Software exploits overrated - it's the humans you need to be watching

    Dumb passwords and phishing the main threats Weak passwords and phishing offer far easier mechanisms for breaking into most organizations than exploiting software vulnerabilities. A study by US cybersecurity firm Praetorian based on 100 penetration tests and 450 real-world attacks discovered...
  9. Logethica

    Cyber-Psychology: Security,Bullying,& Smartphone Withdrawal

    Cyber-Psychology: Security, Bullying, & Smartphone Withdrawal: [IMAGE:Flickr.com-The scientific explanation by ky_olsen (reuse permitted)] The social psychology of cybersecurity: SOURCE: thepsychologist.bps.org.uk John McAlaney, Helen Thackray and Jacqui Taylor consider motivations for...
  10. SpartacusSystem

    How Bitcoin helped fuel an explosion in ransomware attacks

    Ransomware is booming. Be it Locky, CryptXXX or one of the countless other variants of the data-encrypting malware, cybercriminals are making hundreds of thousands of dollars every month off the back of swathes of infected victims each paying a few hundred dollars each to get access to their...
  11. SpartacusSystem

    5 Cyber-Security Myths We Need To Ditch

    Pick a subject, any subject, and there are myths and pure nonsense that someone will buy into. Birds will die if they eat the uncooked rice flung at newlyweds. (Nope) If you eat Mentos and drink Diet Coke simultaneously your stomach will explode. (Hardly) You only have one credit score. (Wrong)...
  12. Logethica

    ORWL: The Secure, Portable, Open-Source PC

    Need a tamper-proof, encrypted PC? The portable, open-source ORWL could be what you're looking for.. [Image: Design Shift] ORWL, whose name is inspired by George Orwell, is billed by its maker Design Shift as the first "physically secure computer" due to the lengths it's taken to lock down...
  13. Logethica

    Photon Vs Electron: The Battle for Cyber Security

    Photon; A particle representing a quantum of light or other electromagnetic radiation. A photon carries energy proportional to the radiation frequency but has zero rest mass. Electron; A stable subatomic particle with a charge of negative electricity, found in all atoms and acting as the...
  14. Logethica

    Neural Implants: Could Brains be Hacked for Ransom?

    A Future With Neural Implants Means Hackers Can Remote-Control Your Brain: "Give us $10,000 or you're toast." You can hear the voice clearly, but there's no one in your house. It's coming from inside your head. From your neural implant, to be exact. Hackers. "We've infected your brain chip...
  15. Logethica

    Biometrics, Cyber Security, & Criminal Law

    Our Fingerprints Are Portals Into Our Digital Lives — But the Laws Haven't Caught Up: (ARTICLE DATE: 10 Aug 2016) Your fingerprint can do more than unlock your phone. In just a few years, the tips of your phalanges may be the most powerful, speedy and safe tool to protect and access a trove of...
  16. Logethica

    Over 75 Cybersecurity Tips in This Free eBook!

    Over 75 Cybersecurity Tips in This Free eBook! Are you worried about cybercrime against your business? The increasing reliance on technology can certainly make running a business easier. But it also opens up the possibility for hackers to access and potentially steal your important data. More...
  17. Logethica

    A Guide to IoT (the Internet of Things)

    What is the Internet of Things (IoT)?: The internet of things (IoT) is the network of physical devices, vehicles, buildings and other items—embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data.SOURCE:Wikipedia...
  18. Logethica

    Hardware Cyber Security & Side-Channel Attacks

    Analysis: Hardware could be the next frontier for cyber security: We tend to think of cyber security as a software issue with a software solution: install antivirus or firewall software on your device and it can protect against the majority of threats out there. However, this is ignoring...
  19. Logethica

    Top 5 IT Security Certifications To Enhance Your Career

    Top 5 IT Security Certifications To Enhance Your Career While not having an IT security certification doesn’t disqualify you from getting a job offer or promotion, but prospective employers looking for industry-leading credentials look at it as one measure of qualifications and commitment to...