Emerging Cyber-Security Technologies in 2017

IT security as we know it is experiencing a revolution. The vast number of legacy systems are replaced by storage and transmission systems that are more complex, mobile, wireless, and even hardware independent. The war between data defenders and data thieves has been described as a cat-and-mouse game. As soon[…]

Read More

Reality Hacking – Exploiting Religion and Occult Science

Introduction Supernatural and Occult has always captured the imagination of the human mind. There are numerous cases where specific beliefs have been exploited by people for wrong purposes. It is important to understand where to draw a line. While It is easy to slip into debates related to religion and[…]

Read More