Top news of the week: 15.12.2021.
Innovations And Trends
13 Keywords For Sticky Cybersecurity Content!
If you thought keywords like the ones you use IN content, nope! These words are crucial to writing B2B marketing content seeping with juicy marketing goodness! Cybersecurity content that ...
Log4J Vulnerability: A Legacy of Cybersecurity from Java to Blockchain and Minecraft
The who, what where why and how to fix the Log4j vulnerability.
An Intro to Privacy Enhancing Technologies (PET) and Why We Need Them
After 2021, a year already marked by the amount - and the size - of data leaks and cyberattacks, PET will be one of the best defensive techniques.
Build Your Next eCommerce Store on NodeJS
Top easiest ways to make an eCommerce store with Node.js. Shopify vs. buit-for-you solution.
Why you Should Avoid Security Nihilism
NSO's customers do not need their victims to do anything to gain unauthorized access.
Log4j Vulnerability: What You Should Do to Mitigate the Risks
The Log4j vulnerability (CVE-2021-44228) is an InfoSec risk to your IT. Log4j is an open-source project that provides libraries for...
Kamala Harris is on to something: AirPods are bad
Cybersecurity experts confirm that Bluetooth signals can in fact be intercepted. And old-school earbuds have a level of retro cool
Ethical implications posed by the Metaverse Blog LoupedIn
In a day and age where huge corporations race to announce their own future constructs of a metaverse, we look at the ethical implications these new…