General security

What Apple Knows about Us

Introduction Every day, we share information about us or what we do on the Internet, and our information is targeted by multinational companies in order to b

StingRay Technology: How Government Tracks Cellular Devices

StingRay Technology StingRay is an IMSI-catcher (International Mobile Subscriber Identity) designed and commercialized by the Harris Corporation. The cellula

Online Defamation Cases - Part II

Introduction We all know how important it is nowadays to have a clean online record, almost as important as having no previous criminal offences. That is why

Online Defamation Cases - Part I

Introduction We all know how important it is nowadays to have a clean online record, almost as important as having no previous criminal offences. That is why

What is Online Defamation /a.k.a. Cyber Libel/ and How it Pertains to some Contemporary Legal Systems

Preface: Balancing Freedom of Expression and Reputation Protection [pkadzone zone="main_top"] The right to freedom of expression – is there a better way to b

Protecting WordPress Installations in an IaaS Environment

Introduction In this article we're going to take a look at how to secure a WordPress installation against attackers in an IaaS virtual machine. Virtual machi

Information Security of Nanorobots

1. Introduction The year is 2045. A 31-year-old woman is brought to the hospital complainingof headaches and fever. The doctors identify a species of equine

Evolution of 3D Printing Technology Raises Security Concerns

Introduction Also known as the term additive manufacturing (AM), 3D printing is a process for making a three-dimensional object of almost any shape starting

Microsoft DirectAccess

In this article we will learn about a very famous security product of Microsoft known as Microsoft Direct Access. It is a product built over an old security

Why email puts your business data at risk, and what to do about it

In spite of the abundant availability of enterprise software designed to help businesses be more productive, cost-effective, and security conscious, most bus