Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

- March 18th, 2025 - (Posted in Cyber politics)
Politics, information technology, and privacy. A triad continually seeking balance with a history of conflict that originates from the introduction of personal computers at the consumer level. Attempts by the U.S. government in preventing access to “strong enough” cryptography for foreign nationals and states were numerous from 1990 onward. Dubbed...

Data Brokers: How Law Enforcement Rely on Inaccurate Data to Supplement Investigations

- June 15th, 2022

Author: Jesse McGraw, alias Ghost ExodusPublication date: 11/06/2022 Government public record databases apparently help law enforcement officials save lives, prevent further crimes from being committed by perpetrators, and also provide...

  

The “Mother of all Demos”. Douglas Englebart’s Vision of the Future

- May 12th, 2022

Author: Massimiliano BrolliOriginal Publication Date: 12/05/2022Translator: Tara Lie The “Mother of all Demos'' is the name retrospectively used by journalist Steven Levy, in his 1994 book ‘Insanely Great’, to describe a revolutionary...

  

Vannevar Bush’s Visionary Essay: “As We May Think”.

- May 7th, 2022

Author: Massimiliano BrolliOriginal Publication Date: 15/11/2021Translator: Tara Lie Today I would like to bring a visionary essay to light, a source of inspiration for many scientists that have contributed to...

  

RHC ransomware Data Room – January 2022

- February 4th, 2022

Author: Dott. Luca Mella, Cyber Security Expert (founder doubleextortion.com) Translate: Vincenzo Marcovecchio Pubblication Date: 5/02/2022 In recent years, the ransomware phenomenon has been so disruptive that it heavily influences the...

  

Sign up for the newsletter