Infosecurity Slackspace

  1. The Environmental Impact of Storing Dark Data

    A new study highlights the environmental impact of hoarding dark data

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  2. Cyber-Criminals Use Famous DJs to Spread Malicious Files

    Cyber-criminals are using the names of DJs like David Guetta to spread malicious files

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  3. Man Charged After Sharing Cryptocurrency Knowhow

    The worlds of cryptocurrency and Blockchain were stirred in November 2019

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  4. Baking Security Advice into the Mindset

    10,000 baguette sleeves distributed with practical cyber-safety recommendations included

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  5. All-Talking, All-Singing Threats

    Walkie talkie toys and karaoke devices hit the headlines for all the wrong reasons in December 2019

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  6. CE-DOH!

    Research unearths C-level security gaffes

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  7. Is Your Newspaper Secure?

    Who's lagging behind in HTTPS?

  8. Microsoft Seeks Your Hidden Treasures

    Microsoft is giving you the opportunity to turn those buried treasures in your security expertise into solid gold

  9. HoneyBot Lures in Would-Be Factory Hackers

    The shoebox-sized robot acts as a decoy for hackers looking to infiltrate factory environments

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  10. SpongeBob Has Nothing on Flippy the Burger Bot

    Armed only with a spatula, the robot can cook (and flip) 2000 burgers a day - but does it pave the way for a sinister future?

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  11. March Madness or March Badness?

    Cyber-criminals look to hoop cash from the springtime tradition of determining which college basketball teams reign supreme

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

  12. Honoring Crypto's WWII Legacy: The Bombe Will Stay at Bletchley Park

    Preserving the reconstruction of the machine that broke the Enigma code honors history, along with Alan Turing’s legacy

    1. Photo of Slack Alice

      Slack Alice

      Slogger, Infosecurity Magazine

What’s hot on Infosecurity Magazine?