I recently interviewed five Ukrainian soldiers who are fighting against Russian-backed separatists in the Donbas region of eastern Ukraine. During my interview, I jokingly asked one young soldier, who calls himself Myhalych, “Why do Russian and Ukrainian soldiers always wear balaclavas?”
At this very moment, a war rages on in Europe. It is a war with no monuments. No parades. No victories. Only casualties.
It's that time of the year when security officials head for the International Security Conference and Exposition, also known as ISC West, in Las Vegas. This year's conference runs from April 10 to April 13.
Google knows almost everything about you. Even if anonymity is not your priority, there are other search engines that can help you hide your queries.
Many cyber defenders watch for Chinese and Russian hackers. However, we must not forget that smaller countries are also in the cyber attack game.
Automated cybersecurity for big data is becoming popular with many organizations. But can automated cybersecurity keep up with ever-evolving cyber threats?
For cybersecurity experts there are certain precautions that need to be considered to safeguard personal and professional information.
The cyber community needs to get its nomenclature settled with regard to the word “cyber attack.” The term “cyber attack” is popular; it creates good headlines and gets good clicks on search engines.
Net neutrality will affect the data privacy of users that choose not to pay for premium service or lack the resources to do so.
Lately, we have received dozens of messages at InCyberDefense. Readers have asked if it is possible for Facebook or Google to listen in on real-world conversations through a smartphone’s microphone.