
If It's Smart, It's Vulnerable

These books portray the cyber world as a site of many simultaneous battles, in which attackers, whether criminals or states, often have an advantage over the institutions that are their targets. States and legitimate businesses spend enormous amounts to defend themselves but present a large number of “attack surfaces”. Aggressors need to find just ... See more
What to read to understand cyber-security

In this discussion, we explore a wide variety of topics, including social engineering, deceit in the security sector, common hacking vulnerabilities, the legal abuse of data and privacy by big corporations, digital IDs, the future of deep fakes and brain computer interfaces, and a whole lot more.