We’re now getting to that time of year where we pause for reflection, take stock of what we’ve learnt and cast our eyes ahead to the new year with a sense of renewed optimism as to what we can achieve. 2012 can be better than 2011 and every year preceding that. That is the definition […]
In a very recent article on PC World’s website, Eric Geier wrote that 2012 will see a rise in information security threats, aided, in part, by the ubiquity of mobile devices – smartphones, tablets and laptops for example – as well as the growing and sustainable popularity of social networks. Cybercrime is going to become […]
Before he found international fame with his, to all intents, groundbreaking action-novel The Da Vinci Code, American author Dan Brown released a number of novels that later went on to become best-sellers. The first novel he ever released was entitled Digital Fortress, a thriller about a cryptographer who is called in by the National Security […]
The smartphone revolution was always inevitable if we considered Moore’s law as indisputable fact. To abridge a very fascinating and somewhat complicated branch of philosophy coupled with technological discourse, Moore’s law relates to the idea put forward in 1965 by Gordon Moore, Intel co-founder, that the number of transistors on a chip would double every […]
It’s good to RANT. The Oxford Dictionary definition of a rant by the way is: “speak or shout at length in an angry, impassioned way.” We like impassioned, there’s a positive in that description. The word angry we don’t like so much. So, it’s good to RANT. You might have observed the capitalisation of RANT, […]
For now, let us reflect on the good times. The Metropolitan Police revealed at the start of the month that its Central e-Crime Unit saved the UK economy an astonishing £140 million in just the last six months alone. With cyber crime costing the country a gargantuan £27 billion a year, its efforts –IT security […]
The internet is, without a question of a doubt, a vital part of most people’s existence, from people working in forensics, to those involved in ethical hacking and cyber security professionals who keep on top of threats and/or the latest security measures against such activities. And Google is, perhaps, the dominant player in this virtual […]