Welcome back lovelies! I hope the new year has started off well for all of you. Read More News in Asia Is Back
I was out in the field yesterday collecting data for one of my projects and while I was standing on a tall bluff overlooking the ocean with the sunlight streaming through the clouds and my hair whipping across my face and into my mouth and nose, I thought – if this isn’t nice, I don’t know what is. I never expected that I’d need to remind myself of why I was doing all this in the first place, especially this early in my career but here I am and here’s what gets me through it. Read More Women in Academia: What Are We Doing to Ourselves?
Welcome to part 2 of my series on hacking. This entry will be about identifying how a hacker can put his grubby hands on your personal information and tips to protect yourself from them when it is possible.
There is 2 types of ways a hacker can gather information, one of them rely on hacking websites and servers that users don’t have access to, but use by browsing the web. The other one is accomplished by accessing the users’s inputs. It is much easier to protect yourself if you have control over some aspect of this equation. Read More Holy Shit, My Favorite Site Got Hacked! part 2