Category Archives: Cyber Security

Emulators: Legal Gray Area

History of the Emulator   An emulator is a program that emulates a game console, [...]

Risks to Your Machine In Public

  1) Public Wifi If you’ve been online in the past few years, you’ve likely [...]

Internet Of Things: Network Vulnerability

  Internet of Things items are convenient, otherwise they wouldn’t be selling. At least not [...]

Blizzard Entertainment’s 2012 Hack: An Example of How to Do It Right

In 2012, game developers were beginning to experiment with a principle known as “always on”. [...]

Censoring Image Info: Do it Right

Redaction. Once upon a time, I stumbled into a forum thread about image censorship. The [...]

Don’t Plug In Found USB Sticks

Don’t Plug In Found USB Sticks Did you find a seemingly normal USB stick on [...]

Cybersecurity – Firewalls

As we explained previously, cybersecurity is the defence of computers and devices from damage or [...]

CyberSecurity – Secure configuration

As we found out in the last article, cybersecurity is an important part of every [...]

Cybersecurity – An introduction

Cybersecurity is the practice of defending internet-connected systems such as; computers, electronic systems, networks, and [...]

Two Factor Authentication: It’s Important

Sure, Google recommends it for your Gmail account, and maybe Snapchat or Facebook suggested doing [...]