Miguel Leiva-Gomez

Miguel has been a business growth and technology expert for more than a decade and has written software for even longer. From his little castle in Romania, he presents cold and analytical perspectives to things that affect the tech world.

Follow Miguel Leiva-Gomez on Facebook, Twitter

The Security Caveats of NFC Payments

The Security Caveats of NFC Payments

Many people like the convenience of NFC payment but are not aware of the potential risk behind it. There are a couple of things you should know before you hop onto the bandwagon of convenience that contact-less payments provide.

MTE Explains: What Is a “Man in the Middle Attack?”

MTE Explains: What Is a “Man in the Middle Attack?”

For an attack carried out over the Internet to be successful, the hacker behind it has to be clever. And nothing demonstrates wit more clearly than the “man in the middle attack”. It’s time to make people aware of what a “man in the middle” (MiM) attack is and some best practices that could prevent it from being carried out.

Is Google Competing Unfairly?

Is Google Competing Unfairly?

Google is constantly facing litigation for unfair competition, so do you think Google is competing unfairly or it is clear of any wrongdoing?

Are Air-Gapped Computers Hacker-Proof?

Are Air-Gapped Computers Hacker-Proof?

One of the simplest approaches to security is air-gapping (disconnecting the system from the Internet entirely). But, is an air-gapped computer hacker-proof? Let’s find out.