The Troubling Implications of Weaponizing the Internet

With the aggressive onslaught of technology today, cyber experts like Arun Vishwanath of New York are predicting complete domination and war-like uses of the internet. Cyberwarfare has suddenly become a public phenomenon. There has been a significant paradigm shift in the use of the internet, from a tool of socialization and information to an instrument […]

Why Smartphones Are More Susceptible To Social Attacks

Several research studies point to customers being substantially much more vulnerable to social attacks on their smartphones. This is the case for email-based spear phishing, spoofing attacks that try to imitate genuine webpages, as well as attacks by means of social networking sites. The reasons for this originate from the way mobile devices are designed […]

Data Security in the Cloud: Part 1

Today, most users perceive the cloud as safe online software and operating environments, online backup, storage, and file-sharing systems. From Chrome OS, Google’s App Engine, to iCloud, users rely on these systems in today’s technological age, basking in its various resourceful benefits including capabilities for predicting and reacting to adverse events, lowering the possibilities of […]

Scroll to top