Cybersecurity: Hacking Proprietary Protocols with Sharks and Pandas
There is a constant war which plagues cybersecurity; perhaps not only in cybersecurity, but in the world all around us is a battle between good and evil. In cybersecurity if the “evil” side understands or pays more attention to a technology than the “good” side, we see a spike in cyber-attacks. The human race commonly …
Cybersecurity: Hacking Proprietary Protocols with Sharks and Pandas Read More »