The Vulnerabilities of Electronic Voting Systems
Electronic voting systems must perform one of the toughest jobs on the planet. It’s not counting votes. That’s easy. The toughest part is convincing people that the results are...
Five Great Free Security Tools You Should Check Out
As important as it is, cybersecurity is still constrained by budget. Thankfully there are some fantastic free tools that you can add to your cybersecurity arsenal to help you...
What is Endpoint Security?
Network endpoints are computers, laptops, and mobile devices such as tablets and smartphones. If the threat actors compromise your endpoint, they have access to the network. Here’s how to...
QNAP QHora 301W WiFi 6, 10Gbps Router Review: Fast, Affordable, Lots of Virtualization, Weak...
QNAP's $329 QHora 301W is an excellent WiFi 6 router. It's not styled to attract gamers, but creative pros and IT types will like it. They'll also appreciate that...
What is Information Security?
Information security and cyber security are terms that get used interchangeably, but are they really the same thing? We explain the subtle differences between these two closely allied and...
Zyxel Armor G5 AX6000 (NBG7815) Wi-Fi Router Review: 802.11AX, 10/2.5Gbps Ethernet, Forced Cloud Setup
Zyxel's $349 Armor G5 AX6000 (NBG7815) had me happily anticipating a smoother, faster, Wi-Fi and Ethernet experience for my local network, which is currently mired a couple of generations...
Kingston DC500M Data Center SATA SSD Review: Up to 7.68TB of Reliable, Balanced Performance
Kingston's DC500M Data Center SATA SSD is exactly what I've come to expect from the company over the years--a good, stable performer with top-shelf, reliable components. For its intended...
Artificial Intelligence: The Hackers’ New Weapon
Malware is getting smarter---literally. Threat actors are using artificial intelligence to create cyberthreats capable of learning and acting as autonomous agents that can change their tactics as required to...
Signal Messenger: Simple Security, Guaranteed Privacy, Great Functionality
In our hyper-connected, always-on world, privacy is in everyone’s thoughts. Instant messaging is the dominant tool for remote conversations. How can we use instant messaging and maintain our privacy?...