The Vulnerabilities of Electronic Voting Systems

The Vulnerabilities of Electronic Voting Systems

Electronic voting systems must perform one of the toughest jobs on the planet. It’s not counting votes. That’s easy. The toughest part is convincing people that the results are...
Hacker's Laptop

Five Great Free Security Tools You Should Check Out

As important as it is, cybersecurity is still constrained by budget. Thankfully there are some fantastic free tools that you can add to your cybersecurity arsenal to help you...
Network Cables

What is Endpoint Security?

Network endpoints are computers, laptops, and mobile devices such as tablets and smartphones. If the threat actors compromise your endpoint, they have access to the network. Here’s how to...
QHora 301W

QNAP QHora 301W WiFi 6, 10Gbps Router Review: Fast, Affordable, Lots of Virtualization, Weak...

QNAP's $329 QHora 301W is an excellent WiFi 6 router. It's not styled to attract gamers, but creative pros and IT types will like it. They'll also appreciate that...
Brown envelope with a top secret stamp

What is Information Security?

Information security and cyber security are terms that get used interchangeably, but are they really the same thing? We explain the subtle differences between these two closely allied and...
Zyxel Armor G5 AX6000

Zyxel Armor G5 AX6000 (NBG7815) Wi-Fi Router Review: 802.11AX, 10/2.5Gbps Ethernet, Forced Cloud Setup

Zyxel's $349 Armor G5 AX6000 (NBG7815) had me happily anticipating a smoother, faster, Wi-Fi and Ethernet experience for my local network, which is currently mired a couple of generations...
Kingston DC500M 7.68TB

Kingston DC500M Data Center SATA SSD Review: Up to 7.68TB of Reliable, Balanced Performance

Kingston's DC500M Data Center SATA SSD is exactly what I've come to expect from the company over the years--a good, stable performer with top-shelf, reliable components. For its intended...
artificial and human had reaching toward each other

Artificial Intelligence: The Hackers’ New Weapon

Malware is getting smarter---literally. Threat actors are using artificial intelligence to create cyberthreats capable of learning and acting as autonomous agents that can change their tactics as required to...
Signal Messenger Logo

Signal Messenger: Simple Security, Guaranteed Privacy, Great Functionality

In our hyper-connected, always-on world, privacy is in everyone’s thoughts. Instant messaging is the dominant tool for remote conversations. How can we use instant messaging and maintain our privacy?...

Subscribe to stay updated with the latest news on data storage, network security, and surveillance.