So you want to become a security researcher? It’s an exciting field, with many different directions to take. This post aims to outline the different aspects of security research and how to get started!
Many gamers are familiar with specialized mice targeting Massively Multiplayer Online (MMO) games, known as MMO mice. These mice contain many customizable macro keys, usually laid out as a number pad on the left side of the mouse, where the thumb naturally rests. While some MMO mice on the market can retail for around $80, the Redragon Impact M908 can be purchased for $36.99 on Amazon. But how does this mouse hold up?
This post is based on an answer I wrote to a question on Quora. The question was posed by an aspiring software developer, wanting to know the steps they need to take to move forward in development.
The term Internet of Things (IoT) has picked up in popularity as more and more devices are connected to the Internet. Everything from home refrigerators to industrial control systems have been found connected, and in many cases, with minimal to no security. What are the consequences? How should they be secured? Should IoT devices be avoided? Read below to find out.
As Cryptocurrency such as bitcoin becomes more mainstream, attacks focusing on generating and/or stealing more of these coins are becoming more common. Since 2015, there have been several large-scale attacks on coin exchanges, and we’re now even seeing websites that are embedding code to hijack resources from visitors. So what does that mean for Internet users, and how to they prevent hijacking?
What is BIOS security? Why enable it? What else can be done to protect publicly accessible machines and take home company laptops?
In my previous write-up about WannaCry, I addressed that the tools were dumped by a group called ShadowBrokers. But who are they? What is their motivation? Let’s take a look.
An article posted recently by Digital Journal details how researchers at Facebook had to shut down a project after fears that they could lose control of their AI.
Before we can address the lessons learned from the WannaCry attack, we first need to understand what it was and how it spread so efficiently.
A recent project has brought to mind an interesting set of questions. Does Web 3.0 exist? What even is Web 3.0?