By Prof. Oliver Popov, Department of Computer and Systems Sciences, Stockholm University In 2008, Poland and Sweden recognised the need for a forum for wider...
Author - Davina Luyten
By Prof. Marijke Coetzee, University of Johannesburg Ransomware is on the rise. In the USA, it is estimated that around 65,000 successful breaches occurred in...
By Nil Ortiz, Carolina Fernández, Jordi Guijarro and Shuaib Siddiqui, i2CAT Knowing about our public identity Our identity is scattered along a myriad of sites...
By Leonardo Lanzi, coordinator of the GARR-CERT Hi, probably you’re reading this while connected to your home wireless network and you already followed...
By Joeri de Ruiter, Technical Product Manager at SURF Nowadays, wherever you go it is likely that there is free wifi on offer. This can be very convenient when...
Whether you play chess, Taboo or Tomb Raider, games are entertaining and hold the attention. For a moment in time, the world of the game becomes reality, and...
The most unfortunate thing about backups is that we usually realise we need one when it’s already too late. We want to recover data we lost, but – unless...
Theoretic training is never as effective as practical training, theoretic knowledge may not always be enough, let’s find out why. By Justinas Rastenis...