İlker

120 Added | 17 Magazines | 11 Following | 3 Followers | @ilkeri | Keep up with İlker on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “İlker”

How Why the Cybersecurity Landscape Is Changing

A comprehensive new report from Cisco should "scare the pants off" enterprise security leaders.<p>Cisco recently published its 2018 annual cybersecurity …

How To: Hack Open Hotel, Airplane & Coffee Shop Wi-Fi with MAC Address Spoofing

After finding and monitoring nearby wireless access points and devices connected to them, hackers can use this information to bypass some types of …

To Control Your Life, Control What You Pay Attention To

One of the best insights on what true productivity means in the 21st century dates back to 1890. In his book <i>The Principles of Psychology, Vol.1</i>, William James wrote a simple statement that’s packed with meaning: “My experience is what I agree to attend to.”<p>Your attention determines the experiences …

Time Management

Russian Hackers Attacking U.S. Power Grid and Aviation, FBI Warns

Russian hackers are conducting a broad assault on the U.S. electric grid, water processing plants, air transportation facilities and other targets in …

Cybersecurity

What CISOs Should Know About Quantum Computing

As quantum computing approaches real-world viability, it also poses a huge threat to today's encryption measures.<p>1 of 11<p><i>Image Source: Adobe Stock</i> …

5 things I'm glad I learned from Stephen Hawking

Famed cosmologist Stephen Hawking, who passed away early Wednesday at the age of 76, was a unique public figure, one who straddled the line between …

Stephen Hawking's Black Hole Theory Explained For Non-Theoretical Physicists

'If you feel like you're in a black hole, don't give up, there is a way out'.<p>Professor Stephen Hawking had a rather ambitious aim in life - to …

10 Breakthrough Technologies 2018 - MIT Technology Review

Every year since 2001 we’ve picked what we call the 10 Breakthrough Technologies. People often ask, what exactly do you mean by “breakthrough”? It’s …

Artificial Intelligence

How to buy a camera in 2018

Smartphones have replaced dedicated cameras for most folks, but weirdly, that's a good thing for photography lovers. With fewer boring point-and-shoots, manufacturers are focusing on building incredible cameras like Sony's RX100 Mark V compact, the Fujifilm X-T2 mirrorless and Nikon's high-end, …

Quantum memory storage is more efficient and secure than ever

Quantum Memory<p>In a major first for the advancement of quantum memory, researchers at Laboratoire Kastler Brossel (LKB) in Paris have achieved …

The Era of Quantum Computing Is Here. Outlook: Cloudy

After decades of heavy slog with no promise of success, quantum computing is suddenly buzzing with almost feverish excitement and activity. Nearly …

6 Emerging Categories for Blockchain Use Cases

Disclaimer: This is not investment advice.<p><b>May 12, 2015.</b> That was the day I purchased my first bitcoin after a few months of researching and …

Blockchain

Why Triton malware will 'change the game' of cyberwarfare

Mayer Brown partner and attorney Marcus Christian explains the exploit in Triconex systems, how hardware hacks work, and the legal ramifications of …

40 seconds cycling, three times per week: That’s how much you need to ride to get fit, says BBC documentary

<b>Volunteers in BBC documentary see upp to 14 per cent improvement in fitness over five weeks</b><p>Two minutes of riding per week isn’t a lot, but apparently …

UK Government warns energy, health and water brands to prepare for cyber attacks or face fines

The UK government has warned firms providing "critical" services that they could risk fines of up to £17m if they do not have effective cyber …

Telegram Launches the Biggest ICO Ever

<b>Telegram, an encrypted messaging app is launching an ICO that is expected to be one of the biggest ever. The company’s founder Pavel Durov wants to</b> …

Cryptocurrency

Hacking Tools List for Hackers & Security Professionals

Penetration testing & Hacking Tools Tools are more often used by security industries to test the vulnerabilities in network and applications. Here …

Information Security

The 10 Statistical Techniques Data Scientists Need to Master

This was a basic run-down of some basic statistical techniques that can help a data science program manager and or executive have a better …

Data Science

New security service from Cloudflare hopes to kill the VPN once and for all

Remote workers or business travelers have long been familiar with the travails of working through virtual-private network software, but Cloudflare …

Information Security

EU privacy boom’s a business bust

In Stockholm, you can store your data in a refurbished nuclear bunker behind a 40-centimeter-thick steel door. In Berlin you can buy a spy-proof …

Privacy

When Scriptlets Attack: The Moniker

Posted by and ON JAN 11, 2018<p><i>Authored by:</i> <i>Alexander Sevtsov</i> <i><br>Edited by: Stefano Ortolani</i><p>In the previous article, we have described an attack that makes …

Cybersecurity

Cyberattacks could lead to use of nuclear weapons

The world's nuclear weapons may be more vulnerable to cyber attacks than previously thought and could result in an accidental missile launch …

Cyber-attacks

Beagle – Find vulnerabilities in your websites easily

I came across a new scanner named Beagle. This scanner really crawls fast compared to the other scanners I have experienced. It’s faster in detecting …

Information Security

Cyberattack could lead to inadvertent nuclear strike, think tank warns

Nuclear strikes could be launched by mistake because aging or unsophisticated weapons systems are vulnerable to cyberattacks, an international relations think tank warned Thursday.<p>A hack could lead to false information being passed to decision makers during a crisis, the think tank, Chatham House, …

North Korea

Apple Health app data used as evidence in rape investigation

Law enforcement might have difficulty accessing iPhones, but it can obtain a wealth of information when it does get in. German investigators have used data from iOS' built-in Health app as evidence in the investigation of a rape and murder case. Police cracked the suspect's phone with the help of …

GeoTagging

After More Than a Decade, Wi-Fi Security Finally Gets a Major Update

WPA3 promises better authentication, stronger encryption and protection for open networks.<p>Wi-Fi Protected Access II, commonly known as WPA2, has been the standard for securing wireless networks for over a decade, but cracks are starting to show. The industry is now getting ready for its successor …

Wi-Fi

How Getting Hit by a Bus Can Improve Your Cybersecurity | Inc.com

I got hit by a bus last week, and I don't mean that figuratively. Here's what happened: I was actually sitting in the back of an SUV moving about thirty miles per hour on a busy Los Angeles thoroughfare when a bus came out of nowhere driving about the same speed and slammed into us.<p>The vehicle I …

Cybersecurity

SCADA security: Bad app design could give hackers access to industrial control systems

'Shocking' flaws show apps for industrial control systems are being built without enough thought for security, according to researchers.<p><i>Video:</i> …

Cybersecurity

How an industry-breaking bug stayed secret for seven months

How an industry-breaking bug stayed secret for seven months — and then leaked out<p>When Graz University of Technology researcher Michael Schwarz first reached out to Intel, he thought he was about to ruin the company’s day. He had found a problem with their chips, together with his colleagues Daniel …

Information Security

Blockchain and GDPR – Many Open Questions to be Addressed and Solved!

Blockchain involves various computers that are located in different states around the world so that the jurisdictions and applicable laws are …