Internet Security Market : Overview, Growth Factors and Competitive Players till 2028

Feb 16, 2019 (WiredRelease via COMTEX) — Internet security plays an important role in protecting data from threats of viruses, hacking etc. Internet security is increasingly adopted to ensure safe co…
internet security – read more

Gaming Like It’s 1923: Winners Coming Soon!

Judging is almost complete! If you entered our public domain game jam Gaming Like It’s 1923, or if you’ve been following along, get ready for the upcoming announcement of the winners in our six categories:

  • Best Analog Games
  • Best Digital Game
  • Best adaptation of a 1923 work
  • Best remixing of multiple sources
  • Best “Deep Cut” (use of a work not listed on any of the round up articles)
  • Best Visuals

If you haven’t had a chance to try out any of the games, go check out the submission page where you’ll find all 35 entries, with a mix of analog and digital games in a wide variety of genres and styles, all based on works that entered the public domain in 1923.

Our panel of judges has finished trying out the entries, and now we’re tallying up their scores and going through their reviews to determine the final winners, who’ll be receiving prizes including Techdirt swag and copies our our game, CIA: Collect It All. We’ll be announcing the results in the next week or two, so stay tuned for an announcement!

Thanks to everyone who entered the jam, everyone who’s tried out the entries, and of course our panel of judges!

Permalink | Comments | Email This Story


Xiaomi electric scooter reportedly vulnerable to hijacking hack – CNET

Xiaomi electric scooter reportedly vulnerable to hijacking hack  CNET

Flaw could allow hackers to remotely take control of the vehicle, including acceleration and braking, a researcher says.

“HTTPS hijacking” – read more

Equifax Data Breach A Sign Of Global Cyberwarfare? – ISBuzz News

Equifax Data Breach A Sign Of Global Cyberwarfare?  ISBuzz News

The Equifax data breach in which millions of Americans had their personal details stolen may have been carried out by a foreign government in a bid to recruit …

“cyber warfare news” – read more