February 16, 2018

RESNA- Why as a Technologist you should know about it?

RESNA – Rehabilitation Engineering and Assistive Technology Society of North America RESNA, is the premier professional organization dedicated to promoting the health and well-being of people with disabilities through increasing access to technology solutions. RESNA advances the field by offering certification, continuing education, and professional development; developing assistive technology standards; promoting research and public policy; and sponsoring forums for the exchange of information and ideas […]

December 30, 2017

Assistive Technology and Why should you build one?

Assistive Technology (AT) and Why should you build one? Assistive technology (AT) is any item, piece of equipment, software program, or product system that is used to increase, maintain, or improve the functional capabilities of persons with disabilities. Assistive technology is an umbrella term that includes assistive, adaptive, and rehabilitative devices for people with disabilities and also includes the process used in selecting, locating, and using them. People who have disabilities […]

December 14, 2017

Alpha Composting Explained

alpha composting explained How mining works on the blockchain? Alpha Compositing is the process of combining an image with a background to create the appearance of partial or full transparency. It is often useful to render image elements in separate passes, and then combine the resulting multiple 2D images into a single, final image called the composite. For example, compositing is used extensively when combining […]

December 14, 2017

Wiki Science Competition 2017

The Wiki Science Competition (WSC) is an international photo contest for the sciences, organised by Wikimedia this November. Wikimedia is the movement behind Wikipedia, the free encyclopaedia – a global collaboration authored by volunteers. Our culture cannot be imagined without science. And in our visual world, it’s not enough to just speak about science: we must also show it. For this, we need photographers to capture […]

December 13, 2017

Cryptocurrency and why cybercriminals love it

Ever pretend you know what your friends are talking about because you want to sound smart and relevant—and then trap yourself in a lie? Okay no problem there, so the next time someone asks, “What is cryptocurrency, anyway?” instead of awkwardly shrugging, be prepared to dazzle them with your insider knowledge. What is cryptocurrency Cryptocurrency, in a nutshell In its simplest form, cryptocurrency is digital money. It’s currency that […]

December 13, 2017

Blockchain technology: For cryptocurrency and more

Imagine a place where you can safely store all your personal information and only you decide who has access to it. You can choose which parts of that information you want to share, and you can just as easily revoke that access. If this place ever comes into existence, I am willing to bet it will be built on blockchain technology. Blockchain technology is still […]

December 13, 2017

Blockchain Technology

  Googlelle: Blockchain A blockchain, originally block chain, is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typically contains a hash pointer as a link to a previous block, a timestamp and transaction data. By design, blockchains are inherently resistant to modification of the data. Harvard Business Review defines it as “an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way.” For use as a […]

December 13, 2017

Internet of Things (IoT) security: what is and what should never be

We are all lucky enough to live a world full of interconnected devices, which is certainly cool and convenient because it’s so easy to keep remote things at your fingertips wherever you are. The flip side of this whole technical sophistication is that anything connected to the Internet is potentially vulnerable. Cybercriminals are busy looking for ways to compromise various smart devices and have had […]


Must Know

Cybersecurity Carol: This Year’s Most Hackable Holiday Gifts

A classic holiday story is A Christmas Carol by Charles Dickens, which tells the tale of how a grumpy man learns from his mistakes, as guided by the Ghosts of Christmas Past, Present and Future. Funny enough, our most Hackable Gifts Campaign resembles this tale, as there are lessons we’ve learned around

Read More »

Awesome Reverse Engineering Resource Compilation

Reverse engineering is taking apart an object to see how it works in order to duplicate or enhance the object. Software reverse engineering involves reversing a program’s machine code back into the source code that it was written in, using program language statements. Software reverse engineering is done to retrieve the source code of

Read More »

DoubleLocker Delivers Unique Punch Hit to Android

Combines Android ransomware with capability to change users device PINs. Android users downloading a fake Adobe Flash Player from a malicious website may find themselves victimized by a unique strain of Android ransomware called DoubleLocker, ESET researchers disclosed today. DoubleLocker, which was discovered in the wirld in August, will not

Read More »

Multi-stage malware sneaking into Google Play

Another set of malicious apps has made it into the official Android app store. Detected by ESET security systems as Android/TrojanDropper.Agent.BKY, these apps form a new family of multi-stage Android malware, legitimate-looking and with delayed onset of malicious activity. Play Protect  Google Play Protect helps you keep your device safe

Read More »

New campaigns spread banking malware through Google Play

This year we have seen many different malware campaigns trying to compromise users with malicious apps distributed via Google Play. Even though these apps are often removed within days after having been reported to Google, they still manage to infect thousands of users. All apps submitted to Google Play are

Read More »

Wi-Fi at risk from KRACK attacks – here’s all you need to know

KRACK: Key Reinstallation Attack​ Actually, there are several attacks of a similar sort discussed in the paper that introduced KRACK by the researchers, so they’re more properly known as the KRACK Attacks. These KRACK attacks mean that most encrypted Wi-Fi networks are not as secure as you think. KRACK works against networks using WPA

Read More »