Threat Modeling: How Can We Use It for Our Cybersecurity?

Threat modeling is a set of principles, ideas, and tools used by software developers to imagine how their cybersecurity system should look like. Thankfully, as users, we don’t need to spend a semester on MIT to learn the exact coding techniques that come with it but can rather focus on the part that we can

Read More...

How is Blockchain Affecting Cyber Security

Blockchain technology is revolutionary and will bring meaningful differences in how people do business. How is blockchain affecting security? In order to stay away from rugged definitions and cumbersome visualization, let us, for starters, try to imagine Lego blocks in a digital world. Every time a transaction is made, in a digital sense of the

Read More...

How does a VPN work? Why setting up a VPN is a good idea?

How does a VPN work? When Eric Arthur Blair, also known as George Orwell, wrote Nineteen Eighty-Four after the Second World War, he probably couldn’t even imagine the level of sophistication the future surveillance society will have and don’t get us wrong; we do live in a surveillance society. While today we are not at

Read More...

Top 10 Best Netflix Hacks that will Change Your Life

While not being a television in the strictest sense of the word, Netflix has revolutionized the way we use our TV. No ads, no commercials, and the ability to binge-watch your favorite shows from start to finish in only one sleepless night, there is no person alive who doesn’t enjoy a little Netflix, with or

Read More...

Face Recognition: How does it impact our privacy?

Although we can all agree that the title of this technology and its application forces us to immediately assume surveillance and police work, we have to at least start wondering about its use and whether in part, or as a whole concept, it invades our rights and privacy. To start with, at the very baseline

Read More...