News
-
"HTTPS abusers hide malware in encrypted tunnels to avoid security"As utilization of encrypted navigation through HTTPS increases, cyber criminals have detected vulnerabilities to bypass detection. Investigations reveal that hackers have discovered ways to attack by exploiting the inability…
-
"Hacking printers exploiting Cross-site printing (XSP) attacks"Researchers at University Alliance Ruhr have discovered security vulnerabilities within 20 different printer models, which could be exploited by hackers to steal sensitive information and disable hardware devices. These security vulnerabilities are …
-
"Biometrics And Payments: Companies Are Using Your Fingerprints For Cybersecurity"As the number of security breaches rises, companies within the transactions industry are further exploring methods of biometrics as a means of uniquely identifying consumers based on biological characteristics, in order to strengthen the…
-
"Healthcare Hack Offers Key Lessons in Cybersecurity, Attorneys Write"Cybersecurity attorneys from the national law firm, LeClairRyan, advise companies and consumers to learn lessons from the 2015 data breach of healthcare firm, Anthem, which hacked personal data of about 80 million Americans. Attorneys emphasize the…
-
Disposable Drones?San Francisco based R&D firm, Otherlab, is being funded by DARPA in a quest to develop low cost, "disposable" drones that can deliver time-sensitive items such as food in emergency or disaster situations. Currently the drones…
-
"Is A Master Algorithm the Solution to Our Machine Learning Problems?"'One algorithm to rule them all' What if there was a "master algorithm" to tie together all of the other machine learning algorithms currently being used today? Author, Pedro Domingos, is studying the possibility. This article provides an in depth look…
-
Areas for Cybersecurity Innovation this YearAs the threat against cybersecurity grows with each new technological advance, researchers must continually find more effective and creative ways to protect digital assets and thwart malicious intruders. Fortinet has …
-
2017 Cisco Security ReportCisco, an industry leader in cybersecurity provides two security reports annually. The 2017 report was made available January 31. Download the latest Cisco Security report here: http://b2me.cisco.com/en-us-annual-cybersecurity-report-2017
-
"Using Mathematics to Hunt for Computer Errors"Researchers are using mathematical analytic methods to improve hardware and software security. http://scilog.fwf.ac.at/en/environment-and-technology/5402/using-mathematics-to-hunt-for-computer-errors
-
"Why a Software-First Attitude is a Must for Internet of Things Era Ahead"Companies need to include digital considerations in their business model and should be relying on their technology managers to help them do so says this author. http://www.zdnet.com/article/software-first-companies-best-prepared-for-internet-of-things-…
-
"New Fingerprinting Techniques Identify Users Across Different Browsers on the Same PC"A three man research team based at Lehigh University has developed a new fingerprinting technique that can track users across different browsers on the same machine. https://www.bleepingcomputer.com/news/security/new-fingerprinting-techniques-identify-…
-
"Moving to Tokenless Physical Access Control"More and more companies are switching to tokenless physical access control and are facing security and logistical challenges. https://www.secureidnews.com/news-item/moving-to-tokenless-physical-access-control/