Homepage
Open in app
Sign inGet started

X2X Technology

Powered by CRIP.TO

  • Blog
  • Academy
  • News
  • The CRIP.TO Solution
  • Mac app store — not as safe as it seems

    Mac app store — not as safe as it seems

    Apple users have long enjoyed a more secure position in the digital world. Since Apple had a substantially smaller share of the personal…
    Go to the profile of Shy BK
    Shy BK
    Jan 19, 2019
    China in the news, the hacking news that is

    China in the news, the hacking news that is

    Everyone likes to have a fall guy or gal when something goes wrong. “Hey, that’s not my fault, I couldn’t help it that this person did…
    Go to the profile of Shy BK
    Shy BK
    Jan 2, 2019
    Caveat Emptor or Buyer Beware Required in ICO Participation

    Caveat Emptor or Buyer Beware Required in ICO Participation

    A Wall Street Journal (WSJ) article written by Shane Shifflett and Coulter Jones, dated 17 May 2018, reported that a WSJ analysis of 1,450…
    Go to the profile of Marco Tracogna
    Marco Tracogna
    May 18, 2018
    Academy
    Encryption 101 — Locking Your Communications for Safety

    Encryption 101 — Locking Your Communications for Safety

    Obfuscation of the contents of sensitive communications has been around for centuries. Even Caesar with his cipher, understood the risk of…
    Go to the profile of Francesco George Renzi
    Francesco George Renzi
    Feb 20, 2018
    Blog
    Taking Personal Cybersecurity Seriously

    Taking Personal Cybersecurity Seriously

    There are a lot of steps you can take in order to protect yourself and your data. At the same time, for every good step there is always a…
    Go to the profile of Marco Tracogna
    Marco Tracogna
    Mar 21, 2018
    It’s Not Always about the Money or Secrets

    It’s Not Always about the Money or Secrets

    The cyberattacks we generally hear about in the media are all about the money or getting sensitive information. When in the attack is for…
    Go to the profile of Marco Tracogna
    Marco Tracogna
    Mar 19, 2018
    News
    Hackers Find Another Hardware Vulnerability

    Hackers Find Another Hardware Vulnerability

    On the doom and gloom front, a new question has recently come up, “Aren’t hackers focused on just software?” It appears the answer is, “No…
    Go to the profile of Marco Tracogna
    Marco Tracogna
    Mar 24, 2018
    Intelligence Agency is Tracking Cryptocurrency Users

    Intelligence Agency is Tracking Cryptocurrency Users

    Some of the primary attractions of cryptocurrency include its decentralized nature, its anonymity, and the fact that it is unregulated…
    Go to the profile of Marco Tracogna
    Marco Tracogna
    Mar 21, 2018
    About X2X Technology, Powered by CRIP.TOLatest StoriesArchiveAbout MediumTermsPrivacy