

Kaz
- Aug 26, 2017
The Sony Hack in a Nutshell
It is widely known by now that Sony suffered one of the worst computer hacks in history late last year. The hack is rumored to have been performed by North Korea, in response to Sony’s upcoming film “The Interview” which depicts North Korean leader Kim Jong Un being assassinated. A group called “Guardians of Peace” has indicated responsibility, but many analysts suspect a larger organization was ultimately behind the event. So, officially the perpetrator of the hack remain
Kaz
- Aug 13, 2017
How the Palm Jumeirah in Dubai Rose from the Sea
Believe it or not, humans have been building artificially into the ocean for thousands of years. One noteworthy example is Caesarea, an ancient Roman port in modern-day Israel whose deep-sea harbor was made by floating large cases of sand and stone out from the coastline. Nowadays, though, artificial land—often called “land reclamation”—has become more popular than ever. With a rapidly increasing global population and soaring real-estate prices in key areas, many property
Kaz
- Aug 10, 2017
The Threat of a Russian Hack Against the U.S.
The only thing more likely than a hack from China is a hack from Russia. It is widely known in the cyberintelligence community that Russian hackers are some of the most skilled in the world. They are especially well-known for their cyber-to-physical attacks, which are cyberattacks that have tangible real-world results. Normally, hackers can only affect cyber information from their targets, such as stealing a credit card number or crashing a website. But in a cyber-to-physi


Kaz
- Aug 5, 2017
Blackberry Phones Still the Most Secure
While Blackberry only commands less than 1% of the mobile phone market, that small market share is not likely to go anywhere. Large businesses and government agencies still use Blackberry extensively, because Blackberry is still the most secure type of mobile phone available. Unlike Androids or iPhones, the Blackberry encrypts all of its messages, making texts and emails much harder to hack. Its data storage, apps, inter-device communication, and phone calls are also all hi