Cybersecurity

bg
‘Pig butchering’ fraud: the link between modern slavery, torture and online crime

‘Pig butchering’ fraud: the link between modern slavery, torture and online crime

The term supposedly represents how victims are fattened up for slaughter like pigs

bg
How cyberattacks on offshore wind farms could create huge problems

How cyberattacks on offshore wind farms could create huge problems

The fact that offshore wind installations are relatively remote makes them particularly...

bg
Five notorious cyberattacks that targeted governments

Five notorious cyberattacks that targeted governments

Warfare is no longer confined to physical battlefields. In the digital age, a new...

bg
Catching online scammers: our model combines data and behavioural science to map the psychological games cybercriminals play

Catching online scammers: our model combines data and behavioural science to map the psychological games cybercriminals play

It’s important to mention that our dataset was not exhaustive. However, we believe...

bg
Should governments ban TikTok? Can they? A cybersecurity expert explains the risks the app poses and the challenges to blocking it

Should governments ban TikTok? Can they? A cybersecurity expert explains the risks the app poses and the challenges to blocking it

The U.S. House of Representatives voted 352-65 on March 13, 2024, to require TikTok’s...

The University of Salamanca is Awarded the International Chair in Blockchain for Cybersecurity in Collaboration with INCIBE

The University of Salamanca is Awarded the International Chair in Blockchain for Cybersecurity in Collaboration with INCIBE

The initiative, coordinated by Professor Juan Manuel Corchado, has a budget of more...

How to Hire Java Developers in 48 Hours with a 7-Day Risk Free Trial

How to Hire Java Developers in 48 Hours with a 7-Day Risk Free Trial

Discover the fastest way to bolster your team! Learn how to hire Java developers...

bg
What are passkeys? A cybersecurity researcher explains how you can use your phone to make passwords a thing of the past

What are passkeys? A cybersecurity researcher explains how you can use your phone to make passwords a thing of the past

Passwords could soon become passé. Effective passwords are cumbersome, all the more...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.