Interviews

Tutanota’s Founder Arne Möhle on Privacy and Encryption in Email Communications

Tutanota is a trusty end-to-end encrypted email communications platform that has been around for a decade now and is already used by...

Linux Kernel’s Stable Branch Maintainer Greg Kroah-Hartman on Security and the Development Process

The Linux kernel is the largest collaborative software project in existence and also one of the most complex and widely deployed at...

Upstream CEO Dimitris Maniatis on Mobile Security and the Pandemic Point of Change

The recent Coronavirus pandemic has accelerated the rise of the mobile as important connectivity, work, and communication devices. Along with this change,...

William Callahan, Director of Government and Strategic Affairs at BIG: How Tracing Crypto Transactions Works

Tracing cryptocurrency transactions has emerged as a necessity this year, as tax and law enforcement authorities have realized that this is the...

LastPass VP Product Management Dan DeMichele on Recent Strategy Shift and Future Plans

LastPass is undoubtedly one of the leading products in the password management space, offering a range of premium features and one of...

CYE’s Red-Teamer Miryam Adjiashvili on Cybersecurity and a Girl’s Career Path in It

Miryam Adjiashvili (Miri X) started fiddling with computers since she was six, and she reached the level of a skilled programmer by...

Shimrit Tzur-David, Co-Founder of ‘Secret Double Octopus’: Discover a New Passwordless Reality

'Secret Double Octopus' is a Tel Aviv-based software company specializing in passwordless authentication solutions for enterprise environments. Its products can practically cover...

Recent Articles

Top 10 Strongest Lightning Users in Anime

Few natural phenomena strike fear into the hearts of humans than lighting. While you might survive a lightning strike, you'll probably wish...

Indian Banks and Finance Companies Targeted by Multi-Staged JSOutProx RAT Malware

Indian banks and financial institutions are being targeted by a multi-tier JSOutProx RAT that acts in two stages.The malware uses spear-phishing emails...

Mega Deletes 144,000+ User Accounts for Repeated Copyright Infringement

Mega has changed its policies and terminated over 144,000 accounts for repeated copyright infringement violations.The company says flagged data is taken down...

Best VPN for Knives Out – Ensured Low Ping & Latency!

The first-person shooting game Knives Out has gained quite a lot of traction recently because of its fantastic gameplay. However, due to...

YouTube Creators Targeted With Phishing Scams Based on Cookie Theft Malware

Google discoverd a new Cookie Theft-based phishing scam that targeted channels belonging to YouTube creators.Actors were sending phishing emails and hijacking channels...
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: Chrome, Edge, Firefox, Safari