December 11, 2017 - Why do threat actors prefer mining for Monero rather than the very hot Bitcoin cryptocurrency? Let us point out the reasons.
December 6, 2017 - More and more applications are moving from desktop to the web, where they are particularly exposed to security risks. They are often tied to a database backend, and thus need to be properly secured, even though most of the time they are designed to restrict access to authenticated users only. PHP is used to develop...
December 5, 2017 - We've talked about how cryptocurrency uses blockchain technology. Now we take a closer look at its other applications, and why blockchain is on the brink of changing the world.
November 16, 2017 - A trusted root certificate is the cornerstone of authentication and security in software and on the Internet. But even this can be abused by criminals. Learn when you shouldn't trust these trusted sources.