How to protect personal data on the Internet Part 1

Tell why our personal information every day are under threat, and share tips on how to protect personal information online.

Many people think that their data criminals are not interested, but experience shows that fame does not affect the willingness of intruders to acquire other people's personal information and to benefit from them. We reviewed the most popular scenarios where your data is at risk and will tell you what to do to keep personal information confidential.


Cyber safety specialist hacked the drones

Indian cyber security expert Rahul Sasi (Rahul Sasi) was told about his way secretly to obtain full control of drones based on ARM Linux, steal them from the owner and even infect other drones, collecting thus the "zombie army". The results of the research he presented on January 26 in his blog.

According to the security officer of the Indian company Citrix Rahula Sasi, the threat of mass hacking of drones by real hackers. He found the vulnerability in operating systems on ARM based Linux is used in popular brands Parrot quadcopters and DJI Phantom.

The third digital war Part 1

During the last decade has been announced lots of predictions regarding what's going to be like prospective warfare, and also exactly what weapons it will likely be run. At the center of this zero has been developed a few apps such as its transformation of infantry components to separate electronic systems by means of augmented reality engineering. The app immediately power down, even offering the name of the majority of promising armed forces tech unmanned aerial cars. No pilots no casualties.

The third digital war Part 3

Rumors about a hundred thousand Chinese army hackers also difficult to consider exaggerated. In recent years in China, hacking has become a cultural phenomenon on a national scale. Hackers have not censured by the government and society, and became national heroes. The state finances the hacking competition, and the winners are recruiting for domestic surveillance of dissident minded citizens, and then for international cyber espionage.

What is cyber security?

Returning into the field of cyber security plan, that commenced talking each calendar year, I do wish to interest quite an intriguing regular that clarifies that theory and its connection to additional, much more recognizable into the metro terms in these advice stability. We're speaking concerning. Info technology Security systems Strategies to cyber security, that has been embraced in July this past calendar year.

The history of smartwatches

The foundation of watches that are smart apparatus, revealing perhaps not merely timing, but in addition having any of those purposes of the personal computer that is perhaps not too young because it may seem to be at first glance. Modern electronics that can be issued by most businesses Pebble, Apple, Motorola, Samsung, obviously, far more operational original apparatus, that scarcely can securely insert to the prefix "sensible", nonetheless it's the tiniest indicated the start of accelerated creation with the specialized niche in electronic equipment.

The history of the server

The mainframe has performed the role of first servers

The server is an electronic device intended for maintenance access to the local or wide area network (files, data, databases, applications). The history server cannot be described only by a sequence specific dates as initially their functions were performed by large computers (mainframes), and then personal computers, then again separate computing system.