15.5 C
Munich
Thursday, September 23, 2021
- Advertisement -
- Advertisement -spot_img

AUTHOR NAME

sariputriyanti

15 POSTS
0 COMMENTS

How To Prevent Spear Phishing Scams

Phishing attacks have become a dreaded phenomenon that can affect individuals and organizations alike. Phishing can be best defined as an unlawful strategy that...

A human firewall: The first line of defence

A recent IBM and Ponemon report highlighted that data breaches now cost, on average, £3.18m. With such a high price tag attached to a breach,...

Design and Implementation of Underwater Wireless Optical Communication System with High-Speed and Full-Duplex Using Blue/Green Light

Ocean that covers more than 70% of Earth's surface, is rich in biological resources, petroleum and other mineral resources. Ocean exploration has earned more...

Google Maps versus TomTom Go

The mobile sat nav showdown As of 4 December 2017, learner drivers will be required to know how to operate a sat nav, and must be...

Human Augmentation

Human augmentation is a field of research that aims to enhance human abilities through medicine or technology. This has historically been achieved by consuming chemical substances that...

GM’s Cruise unveils its first driverless vehicle

Cruise, the self-driving car start-up, majority owned by General Motors, has unveiled its first vehicle designed to be driverless. The electric-powered Cruise Origin was...

The logic bomb: What it is and how to prevent it

Did you think that ticking bombs only exist in action movies? No, the tech world has them too, and they’re called logic bombs. Unlike in Hollywood...

Analysis of the Implementation of 5G Satellite in Indonesia

A satellite is a communication device that is placed outside of space and orbits the earth where the function of a satellite is as a...

What is GitHub?

The “Git” in GitHub To understand GitHub, you must first have an understanding of Git. Git is an open-source version control system that was started by Linus...

Cyber Threat Intelligence Analysis (CTI) Platform

What is CTI?             According to Gartner in 2013, Cyber Threat Intelligence (CTI) is defned as “evidence-based knowledge, including the context, mechanisms, indicators, implications and actionable advice, about...

Latest news

- Advertisement -spot_img