cyber safety or security encryption concept

The Purpose of Encryption and Its Types

September 20, 2021

Code breaking is as old as code making, naturally. But encryption has increasingly advanced beyond decryption, to the point where decryption is in some cases almost impossible. […]

An image of a circuit board with a symbol of a lock in the middle.

The Internet of Me, Us, It, and Those

August 29, 2021

The ownership of the data collected lies with the provider of the device. Therefore its protection too must be ensured by the same. However, that is not the case. […]

An image showing a remote home control system on a digital tablet or phone.

The Proliferation of Internet of Things

August 29, 2021

The ease with which gadgets such as the internet-enabled automatic insulin pump can be operated is truly godsend. Yet, they can be hacked and turned into murder weapons. […]

A female government employee working in a monitoring room

Why Government Collecting Data from Private Sector Is Trouble

August 18, 2021

The value of data was underestimated before the 9/11 attacks. It was only after the terror attacks that the government began collecting data on civilians from the private sector. Many complied, some challenged the requests, and some found a way around it. […]

Image of a phone with security icon on its screen.

Technological Advancements and the Constitutional Laws

August 14, 2021

There is a constitutional doctrine known as search incident to arrest. It states that when there is probable cause to believe that someone has committed a crime, and when that person is arrested, that determination carries with it an authorization to search them. However, the courts decided that the data on cellphone is protected by the Fourth Amendment. […]

1 2 3 6