While users’ concern about the use of online personal information is on the rise, other less obvious sources of data collection may remain unnoticed. As more and more people are committed to preserving a healthy lifestyle, wearables are making their way into everyday life. Fitness trackers, e
The mobile industry recently confirmed that it has achieved a huge milestone in the race to bring 5G networks to life by approving standalone 5G specifications. Considered the next big revolution in mobile connectivity, 5G wireless technology aims at providing better mobile broadband connectivity
With a proliferation of laptops, smartphones, tablets and smart TVs, the need for a strong and fast connection is bigger than ever. While a single router may not be able to cover the entire office space, range extenders or access points which complement the network may come in handy. But having
As more and more data and applications are moving to the cloud, organizations now face a host of new security threats and challenges. Today, cloud infrastructures appear to be the growing target among threat actors. In the last six months, cryptomining attacks have become the leading attack vector
Strong encryption of communications and data, which can both deliver security and privacy for individuals, has been in recent years a subject of public debate. Large-scale adoption of the technology made it difficult for the intelligence and law enforcement communities to perform their surveillance
Net neutrality has officially been repealed and internet service providers (ISPs) now have greater powers. Officials voice their concern as the new rules may lead to the creation of a two-speed Internet and special treatment for a certain type of content. The Federal Communications Commission (FCC)