A Guide to Fake Apps: How to Spot and Avoid Them
Fake applications — programs designed to mimic legitimate applications familiar to us — are among today’s biggest cybersecurity threats.
Cybersecurity: Medieval Witchcraft, Chimeras and the Hound of Hades
Having your own trust architecture is much better than relying on someone else’s, as it is one of the most fundamental parts of our data infrastructure.
Where Would You Find Elf in Cybersecurity?
After you have opened all your presents on Christmas Day, and bored with the Boxing Day film, here’s a little test for you


