This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.
Cybersecurity
‘Pig butchering’ fraud: the link between modern slavery, torture and online crime
The term supposedly represents how victims are fattened up for slaughter like pigs
How cyberattacks on offshore wind farms could create huge problems
The fact that offshore wind installations are relatively remote makes them particularly...
Five notorious cyberattacks that targeted governments
Warfare is no longer confined to physical battlefields. In the digital age, a new...
Catching online scammers: our model combines data and behavioural science to map the psychological games cybercriminals play
It’s important to mention that our dataset was not exhaustive. However, we believe...
Should governments ban TikTok? Can they? A cybersecurity expert explains the risks the app poses and the challenges to blocking it
The U.S. House of Representatives voted 352-65 on March 13, 2024, to require TikTok’s...
The University of Salamanca is Awarded the International Chair in Blockchain for Cybersecurity in Collaboration with INCIBE
The initiative, coordinated by Professor Juan Manuel Corchado, has a budget of more...
How to Hire Java Developers in 48 Hours with a 7-Day Risk Free Trial
Discover the fastest way to bolster your team! Learn how to hire Java developers...
What are passkeys? A cybersecurity researcher explains how you can use your phone to make passwords a thing of the past
Passwords could soon become passé. Effective passwords are cumbersome, all the more...