Hans Christian Andersen on security technologies
Our Danish colleague spilled a lot of cybersecurity ink in his works.
23 articles
Our Danish colleague spilled a lot of cybersecurity ink in his works.
A look at what’s changed in the Matrix in the 18 years since the last update.
Even to the naked eye, the Matrix’s flawed implementation threatens the system’s stability and security.
What do James Bond and his Secret Intelligence Service colleagues know about cybersecurity?
Examples of the cybersecurity technologies and practices of Durin’s folk abound in Tolkien’s Middle-earth.
The Galactic Empire’s heirs analyzed for cybersecurity.
Want to teach your kid the concept of cybersecurity? Start with Transformers: War for Cybertron Trilogy.
Would Johnny Mnemonic’s cybersecurity be plausible in the real 2021?
We examine the tale of Cinderella, one of the earliest stories that attempts to teach children basic cybersecurity principles.
We examine the first installment in the Die Hard series from a cybersecurity standpoint.
If we are to believe the science-fiction of the last century, the hackers of 2020 should have access to a rather curious toolkit.
We trace how the perception of hackers has evolved based on the classic traffic-light-hacking scheme in three versions (British, American, Indian) of The Italian Job.
The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here’s our take.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
It turns out that the tale of Ali Baba is a collection of stories from ancient Persia about … cyberthreats?
Hans Christian Andersen’s report on the Kai infection incident, and the investigation by infosec expert Gerda.
A long time ago in a galaxy far, far away, a lone Mandalorian warrior suffered from cybersecurity issues, both other people’s fault and his own.
The Brothers Grimm fairy tales are deep source of object lessons in information security — not just for children, but also for adults.
In the latest Terminator movie, is Sarah Connor protected against cell-phone tracking?