When Russia blocked the popular messaging app Telegram on April 16th, internet search queries for the term “vpn” surged dramatically, increasing by more than 230%. VPNs have also seen a spike in sales, with top VPN providers reporting a threefold increase in conversion rates. This shows that Russians are not only searching for information on...
Hacking the Hacker by Roger A. Grimes introduces you to top ethical hackers and what they do in the cybersecurity world. Each chapter includes a different profile and an explanation of the technology used. We sat down with Roger A. Grimes, a computer guru who was hired to hack companies to test their cybersecurity, to talk about his...
It seems China’s Firewall is no match for U.S. President Donald Trump. While visiting China on an 11-day trip across Asia, Trump managed to tweet a thanks to President Xi. The social media platform – which Trump uses daily – is banned in China. Other social media platforms – like Facebook, Gmail, and WhatsApp –...
Back in 2014, Adam Shostack – a program manager and security developer for Microsoft – published a book on threat modeling. His book, which is available in Kindle and paperback, explains how to optimize network security for software developers, security managers, and security professionals.   We sat down with him to talk about his book...
1. Peter Turner Senior Vice President of Consumer Security at Avast SecureLine As the Senior VP of Consumer Security at Avast SecureLine, Peter Turner’s responsibilities couldn’t be more important. Turner ensures that Avast products protect their hundreds of millions of users daily. Considering Avast’s popular name, this is no small feat. We thank Peter Turner...
Sprucing up your hardware is a great start — and while that’s not a priority for many of us, keeping your desktop, laptop, and peripherals clean will do wonders for your speed and reliability. Did you know January is Clean Up Your Computer Month? If you’ve been postponing it for a while, now’s a great...
Chances are you’ve heard of BitCoin. Even if you’ve never used it, the crypto-currency – which skyrocketed to be valued at over $14,000 in December – has grown in popularity. But who created BitCoin? How did he do it? And what were his motivations?  There’s little known about the virtual creator of BitCoin known as Satoshi Nakamoto. what is...
Everyone is talking about it, but does anyone actually understand how Bitcoin works? Two years ago, Dominic Frisby knew Bitcoin was going to be big, so set out to ensure the general public had a way to understand it. In his book, Bitcoin: The Future of Money? Frisby tells the story of how Bitcoin was...
Malware Threats by Saiful Hassan is a new book (published June 2017) that takes you through various security threats – from social media to your bank account – and how you can protect yourself from them. We sat down with the author, Saiful Hassan, to see why he wrote this book and how it can help your...
The latest cyber-attack – patrolling under the name of Petya – made its debut nearly two days ago on June 27. Known to be a ransomware attack that encrypts stolen data until a fee is paid in BitCoin, Petya has infected thousands of targets across the Ukraine, Russia, India, and the U.S. The ransomware uses...