Computer Sciences

Predator and prey in cyber stasis

In the world of cybersecurity, just as in nature, there are predators and there is prey. The predators are the hunters, the ones that seek out the weak and the vulnerable on which to prey, that applies whether we are talking ...

Security

Weaponizing the internet for terrorism

Terrorism is a fact of life as are the collectives and networks to which counter-terrorism organizations and the media have given various labels and names. These networks are well versed in exploiting modern information technology ...

page 2 from 2