Cyber-Physical Systems 28/December/2023 What is cryptojacking? Understand the main points of the cryptojacking phenomenon, its origins, how it works and the consequences for individuals and organizations
Cryptography 08/July/2020 Cryptography: Applications to ensure your privacy It guarantees that the confidentiality of the data can be assured, either in its storage or in its communication process
Intelligence 19/April/2018 Chinese government surveillance app is vulnerable to MITM attacks In a report released last week, the Open Technology Fund (OTF) stated that the JingWang app does not protect users’ private information; and, besides that, it is vulnerable to man-in-the-middle attacks
Cyber-Physical Systems 28/December/2023 What is cryptojacking? Understand the main points of the cryptojacking phenomenon, its origins, how it works and the consequences for individuals and organizations
Cryptography 08/July/2020 Cryptography: Applications to ensure your privacy It guarantees that the confidentiality of the data can be assured, either in its storage or in its communication process
Intelligence 19/April/2018 Chinese government surveillance app is vulnerable to MITM attacks In a report released last week, the Open Technology Fund (OTF) stated that the JingWang app does not protect users’ private information; and, besides that, it is vulnerable to man-in-the-middle attacks