How to create your professional deep fake video easily and free of cost
While it would be difficult for the vast majority of people to develop a concrete definition of the concept of “deepfake”, it is a fact that many of us haveRead More →
While it would be difficult for the vast majority of people to develop a concrete definition of the concept of “deepfake”, it is a fact that many of us haveRead More →
Have you ever thought of raising your voice to support a cause or oppose government policies? Sure you have but you were surely worried of getting arrested by the authorities.Read More →
Although it is a known fact that Chinese government acts intrusively on citizens’ privacy, the announcement of a new measure has surprised the whole world. According to cloud security courseRead More →
Nearly two years ago, researchers from a pentesting course company revealed that the Marriott hotel chain had been the victim of one of the largest data breach incidents recorded soRead More →
A fact known by any user familiar with cybersecurity and data protection issues is that China has become a kind of paradise for the illegal sale of databases with facialRead More →
Although almost two years have passed since the entry into force of the European Union’s General Data Protection Regulation (GDPR), the implementation of the appropriate measures for compliance keeps generatingRead More →
Apple often boasts about the level of data protection and security of its devices. While the cybersecurity community recognizes the firm’s efforts and its superiority in encryption and privacy overRead More →
A US Government defense agency that provides technology services to multiple senior officials, including the president, has revealed that their networks could have been compromised. Through a series of lettersRead More →
Among the dozens of controversial tweets posted by Elon Musk, one caught the attention of cybersecurity professionals and enthusiasts last Thursday. Musk tweeted a picture with all versions of theRead More →
As a result of the recent report of a massive data breach in Microsoft’s support area databases, the US National Security Agency (NSA) published its Mitigation of Cloud Vulnerabilities Guidance,Read More →