Apple to scan iPhones for images of child abuse
The new feature lands later this year and has already provoked controversy with security and privacy experts to warn for potential threats Apple plans to run a new system on…
The problem lies in the way we produce, consume, and reprocess plastic materials – Interview with Eleonore Eisath
“In a natural system, it doesn’t matter if you are morally good or bad – you just need to be able to understand the circumstances and take the evolutionary steps…
Unbound enterprise: data anxiety and the counterintuitive nature of risk
The boundaries around the traditional enterprise have been dissolving for a decade or more. Since the advent of the smartphone, business operations and cybersecurity have become increasingly decoupled from physical…
The future of coworking: a workspace but also a place to develop new skills
Interview with Davide Dattoli, founder & Ceo of Talent Garden The best way to predict the future is to invent it. The phrase that appears on Davide Dattoli’s personal website…
The concept of Telemedicine. How it works and what the future holds.
The human need for health around the world created the science of Telemedicine The continuous progress and development of both the medical and technology sectors are unquestionable. Every day, new…
Pegasus scandal: Global democracy under cyber attack
Tracking software penetrates any operating system (iOS or Android) and has the ability to steal passwords, messages and emails Pegasus, an Israeli NSO Group’s spyware, has been used to spy…
There is no cybersecurity without Vulnerability Assessment and Penetration Test
Hunting down cyber threats is an ongoing process that is not for everyone. More and more companies are turning to professionals who know how to implement proactive and iterative research…
Beworm – closing the gap in recycling plastic
The urgent plastic problem We live in a time where our actions in the present largely determine our future. We have the potential to change, and we should hope it…
The Apple case and the evolution of ransomware
There is a cyber threat, that is bringing many companies to their knees in recent times and providing criminals with large and easy profits. The number one danger for managers…
Cryptographers dissect quantum computing and machine learning
Experts in cryptography remain unconvinced about the applications of quantum computers in their field. Opening for the RSA Conference 2021, a panel of academics, cryptographers, and security professionals called into…