A computational literature review of the technology acceptance model - ScienceDirect
Farley on Patents and Power: Where Intellectual Property Law and Military Technology Meet – The Diplomat
ProtonVPN review | TechRadar
How to identify, prevent and remove rootkits in Windows 10 | CSO Online
"Raw Data" Is an Oxymoron | The MIT Press
Blog | Masterful Cyber Security | Polito, Inc.
Schneier on Security
What is OPC? - OPC Foundation
7 Open Source Cloud Security Tools You Should Know
WireGuard: fast, modern, secure VPN tunnel
The FBI Wants Apple to Unlock iPhones Again | WIRED
Face Detection Security System Using Pi,IBM-Watson,Node-red,Twilio,Email Service: 10 Steps (with Pictures)
Eva Galperin | Electronic Frontier Foundation
Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance | Electronic Frontier Foundation
Electronic Frontier Foundation | Defending your rights in the digital world
The Extortion Economy: How Insurance Companies Are Fueling a Rise in Ransomware Attacks | Emsisoft | Security Blog
Is ransomware driving up the price of Bitcoin? | Emsisoft | Security Blog
Emsisoft | Security Blog: Straight-talking security advice from the Malware Experts
Land of the Giants - Vox
CSIAC | Cyber Security and Information Systems Information Analysis Center
Keep Calm and Hack The Box - Beep
Keep Calm and Hack The Box - Optimum
Is Huawei a security threat? Seven experts weigh in - The Verge
Can Huawei Products Threaten Your Business? - ReadWrite
Yubico | YubiKey Strong Two Factor Authentication for Business and Individual Use.