Extortion Search Results

News: Predictions for the New Year

infosecinstitute posted a handy article about what to expect in the new year for cyber security, along with highlighting major game changers from 2015; 2016 Cyber Security Predictions: From Extortion to Nation-state Attacks - InfoSec Resources.

News: Now Thats eating Fresh!

The two fast food restaurants, Farmer Dinner and Burgerville both run their restaurant in a way that supports their local farmers. This provides freshness to their customers. “Our mission is to increase the economic vitality of local agrarian economies,” (Murphy). That’s a bright idea in which local restaurant should take in consideration. We the people should consider the support of local farmers. This will stop the extortion that happens in other countries and stop fast food chain restauran...

Secure Your Computer, Part 4: Use Encryption to Make a Hidden Operating System

This is Null Byte's fourth part in a series about fully securing our computers (Part 1, Part 2, Part 3). In our last Null Byte, we went over how to encrypt an entire operating system to protect our data, however, this doesn't fully protect us. In the case of legal extortion, the government can actually make you give up your cryptographic key to your computer so that they can look through it.

Next Page
Prev Page