Author: Megan Squire / Source: Scientific American
Source: Information Security Buzz
Author: Joshua Morales / Source: teramind.co