Starting in Software Development
This post is based on an answer I wrote to a question on Quora. The question was posed by an aspiring software developer, wanting to know the steps they need to take to move forward in development.
This post is based on an answer I wrote to a question on Quora. The question was posed by an aspiring software developer, wanting to know the steps they need to take to move forward in development.
The term Internet of Things (IoT) has picked up in popularity as more and more devices are connected to the Internet. Everything from home refrigerators to industrial control systems have been found connected, and in many cases, with minimal to no security. What are the consequences? How should they be secured? Should IoT devices be avoided? Read below to find out.
As Cryptocurrency such as bitcoin becomes more mainstream, attacks focusing on generating and/or stealing more of these coins are becoming more common. Since 2015, there have been several large-scale attacks on coin exchanges, and we’re now even seeing websites that are embedding code to hijack resources from visitors. So what does that mean for Internet users, and how to they prevent hijacking?
What is BIOS security? Why enable it? What else can be done to protect publicly accessible machines and take home company laptops?
In my previous write-up about WannaCry, I addressed that the tools were dumped by a group called ShadowBrokers. But who are they? What is their motivation? Let’s take a look.
An article posted recently by Digital Journal details how researchers at Facebook had to shut down a project after fears that they could lose control of their AI.
Before we can address the lessons learned from the WannaCry attack, we first need to understand what it was and how it spread so efficiently.