Great R packages for data import, wrangling, and visualization
The table below shows my favorite go-to R packages for data import, wrangling, visualization and analysis — plus a few miscellaneous tasks tossed in. The package names in the table are clickable if you want more information. To find out more about a package once you’ve installed it, type help(package = "packagename") in your R […] more…Financial Cyberthreats in 2020
2020 was challenging for everyone: companies, regulators, individuals. Due to the limitations imposed by the epidemiological situation, particular categories of users and businesses were increasingly targeted by cybercriminals. While we were adjusting to remote work and the rest of the new conditions, so were scammers. As a result, 2020 was extremely eventful in terms of digital […] more…RSA Conference 2014: The Way Forward
I attended the RSA 2014 Conference in San Francisco, which has held about two weeks ago. This year the conference offered new insights to today’s threat landscape, which will help us all plan for and protect users in 2014 and beyond. Largest Security Conference of 2014 The attendance numbers for RSA are always impressive: this […] more…More information
- Police operation disrupts Beebone botnet used for malware distribution
- An Alexa Bug Could Have Exposed Your Voice History to Hackers
- A Growing and Evolving Cyber Threat
- Can cops legally fire "GPS bullets" at fleeing cars to track suspects?
- Foxit Reader CVE-2019-5031 Remote Code Execution Vulnerability
- Natural defenses: 8 IT security tactics found in nature
- Dark Web marketplace “Nucleus” vanishes – and no one knows why
- North Korea Denies Role in WannaCry Ransomware Attack
- Twitter CEO Dick Costolo to resign, 140-character limit lifted for direct messages
- Microsoft Windows Graphics Device Interface CVE-2017-8676 Local Information Disclosure Vulnerability