Recently, in terms of the use of Internet of Things (IoT) devices in the smart platform for security management, companies have been releasing diverse products, and such products are being proved as effective in the continuous management of computer virology. In addition, in the field of security services, companies and research institutes have been continuously developing solutions using hacking and convergence computing [10][11][12]. This issue covers some of the hottest topics in hacking and convergence computing, including: hacking in convergence computing; electronics hacking, hardware hacking; communication protocol hacking; information indexing, searching, and visualization; secure and anti-hacking; network connection solution; secure virtual network embedding algorithms; secure information authentication protocol; security framework; secure IoT and protocol; privacy and authentication for network; security in convergence computing; cybersecurity; innovative applications of hacking, security computing.The issues between the IoT and the traditional network was performed, and it was concluded that the environment of the IoT-convergence system is a dangerous one with limited resources and fewer network guards. The paper by Li et al.[2] analyzes a study on the service and the trend of fintech security that is based on text mining. This study presents the tasks and directions of the fintech industry in consideration of the successful operation of fintech security through an analysis of the news articles from an online-data collection. The results contributed to a switching of the market awareness of fintech services and security in the present-day ongoing expansion of the fintech market.The paper by Bang [3] introduces the research on financial-institution network-partition design for antihacking. The proposed solution comprises management efficiency, a data-system safety-operation solution, an optimized network-separation system that is developed through the integration of a conventional security system, and a new establishment and process in the financial field. This is a security measure that is supported by the appropriate security of the memory devices for which the minimally required security measure is applied. The paper by Kim et al. [4] presents an evaluation method for secure virtual-network embedding algorithms. This is the Virtual Network Embedding Evaluation Method (VNE-EM) that can be used for purposes such as security, energy efficiency, and mobility functionality. They analyzed a number of studies, and they found appropriate evaluation indexes that can be used in an evaluation of the functionalities of VNE (virtual network embedding) algorithms, for which a grouping of the functional attributes is performed for a real-time classification. The proposed method is more convenient for the performance of the evaluation of the algorithms of infrastructure providers.The paper by Jeong [5] presents a secure informationauthentication protocol that concerns the relationship 123