Currently Viewing: Security

Ransomware attacks – where cybercriminals take control of your files and demand a ransom for their return – are nothing…

Accelerating Cyber-Security With GPUs

Cybersecurity represents one of the most fundamental challenges facing businesses and organizations today. Protecting IT systems and sensitive data from…

Optimizing Security For Linux Users

Linux operating systems were first developed to power personal computers. However, they have since evolved into the leading operating systems…

Is Ethical Hacking A Force For Good?

Mention the word ‘hacking’ to the man or woman on the street, and they’ll probably have a pretty good idea…

GPUs And Video Analysis: How Deep Learning Is Making Video Surveillance Smarter

The Central Processing Unit, or CPU, is the beating heart of all computing systems. This general purpose processor provides the…

The Importance Of Replacing Default Passwords

Until biometric data becomes the standard method of personal identification, the use of passwords looks set to continue. User-generated security…

What You Need To Know To Protect Yourself From The ZombieLoad Attack

If you’re not yet aware, ZombieLoad is a vulnerability recently discovered that follows in the footsteps of last year’s “Spectre”…

Who Should Be Using A Backup?

The word ‘backup’ is often associated with essential items like a backup parachute, battery, or plan. Typically, anything monumentally important…