Top 5 Most Alarming Cyber Security Statistics in 2019
Cyber attacks are growing in prominence every day – from influencing major elections to crippling businesses overnight, the role cyber…
Czech security experts warns Huawei products pose security threat
Huawei and ZTE face new barriers to supplying equipment to critical infrastructure providers and government agencies in the Czech Republic….
Private Internet Access – Most Popular VPN With No Traffic Logs
Private Internet Access claim to provides state of the art, multi-layered security with advanced privacy protection using VPN tunneling. Their…
Xiaomi present new MiWiFi mesh router with Wi-Fi
The routers have four amplifiers – two each for the 2.4GHz and 5GHz networks. You can use either to connect…
Meet “Splinternet” – Killer Of The WWW
It’s 2028. You take a break from running your small business to check on how your daughter is enjoying her…
[In-Depth Guide] – The Basics of Packet Firewall
Popular firewalls are, in essence, a class of intermediate router devices engineered to violate the fundamental design of an intermediate…
Situational Crime Prevention: A Philosophy of Crime Reduction
The ultimate purpose of any security system is to counter threats against assets and strengthen associated vulnerabilities. — Joseph Barry…
Android: Debugging and Analyzing Vulnerabilities
Chapter 1 – Android – Debugging and Analyzing Vulnerabilities It’s very difficult—arguably impossible—to create programs that are free of bugs….
Crypter Handbook – Part 1
Learn Crypter from scratch. Crypters are programs created in order to “obfuscate” (hide) the source code from a file. They…
Kali Linux for Raspberry Pi 4 Relased
Offensive Security just introduced Kali Linux for Raspberry Pi 4, completely upgraded and re-engineered. This is the first model with…
Magic Eye Enables Robots To Improve Their Object Discovering Capacity
Another MIT-created procedure empowers robots to rapidly distinguish items covered up in a three-dimensional haze of information, reminiscent of how…
3 Cybersecurity Conferences of 2019 You Must Attend
As we know security takes a team, and it’s a journey. Boost your security approach by networking and knowledge sharing. Defcon When: 9-11 August, 2019…
Macrocomm announced as sponsor of IoT Forum Africa 2019
Macrocomm has been announced as a Bronze Sponsor of the Internet of Things Forum Africa 2019. This year, IoT Forum…