Digital Waves

Uncovering Threats to Data Integrity Embedded in AI

AI and IoT integrations in intelligent transport systems, smart…
non password authentication fingerprint biometrics green turquoise

No Passwords Required? The Trends of Non-Password Authentication

In the past we’ve talked quite a bit about authentication and…
ev charging vulnerabilities

What Smart Grid Security Vulnerabilities Could Mean for the Energy Sector

Five years ago, Ofer Shezaf, founder of OWASP Israel, shared…
ssl-step-by-step-investigating

SSL-Ready? How to check your SSL settings, step by step

We all know how important SSL is, and in the slew of security…
security-expert-blog-header

How to Be Your Own Security Expert

January is a great time to start a new habit. In fact, research…
connected car data

How Valuable Is Your Connected Car Data?

This month is all about data privacy as we celebrate Data…
privacy statement gdpr

What Should A Privacy Statement Be Composed Of?

With Data Privacy Day quickly approaching, it’s that time…
lost bitcoin recover

Why Recovering Lost Bitcoin Is So Difficult...But What You Can Do Anyway

Those who jumped on the Bitcoin bandwagon early on and invested…
iphone x biometric face ID

iPhone X’s Facial Recognition…Trendy Feature or Security Issue?

Undoubtedly, iPhone X was one of the hottest tech devices…
top botnets 2017

Top 5 Botnets of 2017

While data breaches and other cyberattacks made major news…