Open data fuels innovation, improves transparency and enables better
decision-making in government. No matter what your level of experience
with open data, these 15 lessons an...
As computer experts worry the password is becoming more and more
unstable, many have moved to biometric recognition
[http://www.npr.org/sections/alltechconsidered/2015/04/23/4...
Devices that control the speed of industrial motors operating water
plant pumps and other equipment can be remotely hacked and destroyed.
The post An Easy Way for hackers to...
Brand Article - Contenido de nuestro espacio de marca
A menudo pensamos que las predicciones tecnológicas son una pérdida
de tiempo, porque al mirar el cielo no vemos los...
A flaw discovered on eBay’s website in December gave attackers the
potential to steal millions of user credentials, according to…
The post eBay site vulnerability left u...
Published at LXer: Cyber attacks are getting evil and worst nightmare
for companies day-by-day, and the Distributed Denial of Service (DDoS)
attack is one of the favorite weap...
A discovery by a well-known Google security researcher provides
further proof how antivirus programs designed to shield computers from
attacks can sometimes provide a doorway...
With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a
revolution. They are calling you not to the barricades but to use
your computers, offering you ways to fi...
Juniper Networks Inc said late on Friday it would stop using a piece
of security code that analysts believe was developed by the National
Security Agency in order to eavesdrop...
Some hackers are considerably less talented than the others.
As a part of our security awareness activities, we can't resist the
urge to share with you our compilation ...