Everything You Need to Know About Esports
If you like to play or watch online video games, you might have heard of the word esports, short for electronic sports. While the word includes a wide range of…
Ransomware Virus is Here
In the modern era with the rapid technological development in both fields of informatics and other sciences, new challenges have been reborn and with very specialized knowledge that need to…
The problem lies in the way we produce, consume, and reprocess plastic materials – Interview with Eleonore Eisath
“In a natural system, it doesn’t matter if you are morally good or bad – you just need to be able to understand the circumstances and take the evolutionary steps…
LinkedIn data breach: A second colossal attack affected millions of users!
A recent data breach, back in June exposed 700 million users’ profiles causing great concern The allegations that data for millions of LinkedIn users have been leaked and made available…
Unbound enterprise: data anxiety and the counterintuitive nature of risk
The boundaries around the traditional enterprise have been dissolving for a decade or more. Since the advent of the smartphone, business operations and cybersecurity have become increasingly decoupled from physical…
The future of coworking: a workspace but also a place to develop new skills
Interview with Davide Dattoli, founder & Ceo of Talent Garden The best way to predict the future is to invent it. The phrase that appears on Davide Dattoli’s personal website…
The concept of Telemedicine. How it works and what the future holds.
The human need for health around the world created the science of Telemedicine The continuous progress and development of both the medical and technology sectors are unquestionable. Every day, new…
Pegasus scandal: Global democracy under cyber attack
Tracking software penetrates any operating system (iOS or Android) and has the ability to steal passwords, messages and emails Pegasus, an Israeli NSO Group’s spyware, has been used to spy…
There is no cybersecurity without Vulnerability Assessment and Penetration Test
Hunting down cyber threats is an ongoing process that is not for everyone. More and more companies are turning to professionals who know how to implement proactive and iterative research…
Beworm – closing the gap in recycling plastic
The urgent plastic problem We live in a time where our actions in the present largely determine our future. We have the potential to change, and we should hope it…