Chika Wonah
4d ago · 1 min read · ~10
Cybersecurity — the Incident that Started it All

Cybersecurity — the Incident that Started it All

When the world thinks of cybersecurity, often coming to mind are images of a classified, or covert, room with elaborate computers or the dark web. However, the first technical cyber attack occurred long before the emergence of electronic computing...

Chika Wonah
4d ago · 2 min read · ~10
Digital Addiction and the Tech Impact

Digital Addiction and the Tech Impact

Along with the technology boom, came a whole new kind of addiction — the digital kind, and after years of surrounding ourselves with gadgets and gizmos, people are starting to take notice to the more presumably dangerous side-effects of...

Balaji NM
24/5/2018 · 1 min read · ~10
To Cybersecurity and 2 more
Kickass Proxy – List of 50 very fast Kickass Torrents Proxies & Mirror Sites

Kickass Proxy – List of 50 very fast Kickass Torrents Proxies & Mirror Sites

Torrent sites are popular all the time, it is one of the biggest directories on the internet for a good number of torrent files to get the magnetic links for software, games, ebooks, music, movies, TV shows. Here you can see the list of very fast...

Zacharias 🐝 Voulgaris
23/4/2018 · 2 min read · ~10 · 2
To beBee in English and 4 more
Can We Resist Quantum Hacking?

Can We Resist Quantum Hacking?

Wait, What? I have to admit that this title is purposefully ambiguous, as it hints towards a new kind of hacking and how irresistible it can be. However, the main topic of this Buzz is that even if someone employs this Quantum Hacking, as I call...

Renoy George

Renoy George

Zacharias 🐝 Voulgaris Okay, that's good. So there are options on how the system can be integrated. Thanks.

24/4/2018
Zacharias 🐝 Voulgaris

Zacharias 🐝 Voulgaris

Thank you all for your comments so far. , that's a very good point you are making. Indeed, if the cyber-security system costs an arm and a leg, it may not make business sense to use it, unless the data is particularly valuable. Nevertheless, having a cyber-security system that is quantum-resistant doesn't have to be particularly expensive. It just needs to integrate a different approach to encryption (beyond the textbook methods that everyone uses). Also, have a strong password can go a long way and it doesn't cost much to generate such a password. I've talked about all these topics on my blog (www.foxydatascience) as well as in several videos I've published on Safari.

24/4/2018
David Ayza Enero
13/2/2018 · 8 min read · ~10
To Cybersecurity and 2 more
CYBERSECURITY - Crossing the last frontier

CYBERSECURITY - Crossing the last frontier

The future landed 10 years ago, and with it an innumerable number of devices, technologies, methodologies, and trends has come with it to stay. Some studies foresee that by 2020 there will be 200 billion connected things. We are talking of course,...

Members