
Alex Vakulov
Copywriter and Editor at Freelance
I am a cybersecurity expert & writer 🔸 Helping organizations in making informed decisions to secure their data & assets effectively 🔸 Available for interviews
Articles
-
2 weeks ago |
hackernoon.com | Alex Vakulov
If you have ever spoken about something out loud and then seen an ad for it a few hours later, you have probably had that familiar gut reaction: “Is my phone listening to me?” In reality, it is not just your phone’s microphone. It is everything - your searches, clicks, scroll speed, app activity, shopping habits, and even which videos you pause on. In 2025, it is no longer a question of whether you are being tracked online. It is about how much and what is being done with your data.
-
2 weeks ago |
cshub.com | Alex Vakulov
Here’s a harsh truth that most businesses need to hear: your cloud infrastructure almost certainly has some security gaps. This isn’t because you lack expertise or because all of your security tools are inadequate. Instead, it’s more likely down to the fact that securing complex cloud environments requires balancing security, functionality and business priorities. This is a serious challenge that grows more difficult as your cloud footprint expands.
-
3 weeks ago |
dev.to | Alex Vakulov
It is difficult to claim that any system or program is completely secure. All of them may contain potential vulnerabilities - errors made during the development process - that can lead to serious consequences. Attackers often exploit such flaws. Information security companies continuously monitor vulnerabilities and update security databases.
-
1 month ago |
cacm.acm.org | Doug Meil |Alex Vakulov
A lot of things have come and gone in the last few decades in computing. This post will cover a short list of topics that I saw in my career that were either notable or that people used to argue about a lot. Or both. Some of this might be a fun trip down memory lane, and some may be PTSD-inducing, but it is important to periodically look back in computing to learn from past experiences, as things that seem inevitable outcomes today weren’t always so clear at the time.
-
1 month ago |
cacm.acm.org | Yatish Turakhia |Alex Vakulov
Dynamic programming (DP), first introduced by Richard Bellman in the 1950s, is a fundamental algorithmic technique in computer science with broad applicability across numerous domains. In computational genomics, it has proven particularly effective for sequence-comparison tasks, including those involving DNA, RNA, and proteins. Over the past two decades, advancements in sequencing technologies have massively reduced costs and increased throughput, leading to rapid growth in genomic data.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 961
- Tweets
- 1K
- DMs Open
- No

🧠 Cybercriminals don’t just hack systems—they choose their tools wisely. From low-level exploits in C to stealthy scripts in PowerShell, the languages behind malware reveal how modern attacks are built and deployed. READ: https://t.co/wLXNF4btKG

📱 Worried about SIM swap attacks? Here’s how to stay safe: – Don’t overshare online – Use strong, unique passwords – Avoid storing logins in apps – Lock your SIM with a PIN – Use MFA (not just SMS!) – Watch for sudden signal loss 🔒 Stay alert, READ: https://t.co/erOKkF6XE2

📵 Think you’ve been SIM swapped? Watch for: – No signal or service – Locked out of key accounts – Unfamiliar password reset requests – Carrier messages you didn’t trigger – Friends get strange texts from you – Login alerts from unknown devices READ: https://t.co/erOKkF6pOu