Internet in space: Is there Net on Mars?
Is there Internet on the ISS, what is it like, and how long does it take to get a message from Mars — learn about the networks of today and the future.
76 articles
Is there Internet on the ISS, what is it like, and how long does it take to get a message from Mars — learn about the networks of today and the future.
Dave and Jeff discuss a number of issues ranging from backdooring encrypted chats to POS malware and more.
Facebook suing developers from Ukraine, Apex Legends’ battle against cheaters, Facebook’s double-edged sword on privacy, and more.
In this episode, Dave and Jeff plus some special guests talk travel and keeping your data safe.
This new version of SynAck ransomware uses sophisticated evasion techniques.
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
How can we get prepared for the decryption capabilities of upcoming quantum computers?
We explain what digital certificates are, what types exist, and what problems are associated with them.
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
Drones are a part of the Internet of Things, which is widely known to be vulnerable. SEO title: How to hijack a drone
As we see from recent news, quantum computing is evolving faster than anyone could’ve expected. What does this mean for us, the average users?
For a messaging app to be truly private, encryption is not enough. In this post we discuss the necessary features of private messaging.
In the second part of our “Ask the expert” session, Jornt van der Wiel answers questions about encryption: how it works, what it is for, and more.
Hacked medical equipment can cost patients a lot — their health or even their lives.
Journalists and their whistle-blowers managed to keep the biggest data leak in secret. How did they do it?
Aleks Gostev of Kaspersky Lab’s GReAT discusses the WhatApp move towards encryption and how email needs to be next in adopting end-to-end encryption
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
Over the past week or so, we have seen an escalation between Apple and the FBI in regards to unlocking the iPhone belonging to one of the shooters involved in
What exactly is a VPN? There has been a lot of buzz around it, but why do we need it?