News
-
"You’d Better Change Your Birthday – Hackers may Know Your PIN"In a study it was discovered that 26 percent of individuals use the top 20 most used PIN numbers, which makes guessing of PIN numbers quite easy. Most individuals also use important dates when it comes to creating PIN numbers. It is…
-
"Researchers Develop 'Vaccine' Against Attacks on Machine Learning"A significant breakthrough in machine learning (ML) research has been made by researchers from the Commonwealth Scientific and Industrial Research Organization's (CSIRO) Data61, an arm of Australia's national science agency specializing in data and…
-
"A Malware Can Bypass ‘2FA’ In ‘Android’ Phones, Researchers Found"Researchers have discovered the distribution of malware via the Google Play Store that can evade security firewalls. This discovery follows Google's confirmation that some low-end Android devices contain pre-installed malware. According to cybersecurity…
-
"LTE Flaws Let Hackers ‘Easily’ Spoof Presidential Alerts"Hackers can use off-the-shelf equipment and open source software to exploit security vulnerabilities in LTE that could allow them to spoof presidential alerts disseminated to mobile devices, which could lead to panic and chaos. The attack designed by…
-
"New Research Reveals a Surprising World of IoT"A study has been done by researchers from Stanford University in which they examined user-initiated scans of 16 million homes and 83 million devices to further explore the use of Internet of Things (IoT) devices. From the analysis of scans and devices,…
-
"Healthcare Overconfident in Privacy Maturity, As Breach Rate Rises"Integris researchers conducted a survey to which 258 top business executives and IT decision makers who work in medium-sized to large-sized healthcare organizations responded. Results of the survey reveal that most healthcare organizations are overly…
-
"Three Quarters of Mobile Apps Have This Security Vulnerability Which Could Put Your Personal Data at Risk"According to Positive Technologies' Vulnerabilities and Threats in Mobile Applications 2019 report, most iOS and Android applications contain vulnerabilities that could allow hackers to steal sensitive data. These vulnerabilities derive from insecure…
-
"Google Turns to Retro Cryptography to Keep Data Sets Private"An open source cryptographic tool, called Private Join and Compute, has been released by Google to bolster the privacy of confidential data sets. The multi-party computation (MPC) tool was designed to help organizations with confidential data sets…
-
"Report on Cognitive Security Market, Trend, Segmentation and Forecast 2026"The growing frequency of cyberattacks has resulted in more interest in cognitive security. Cognitive security solutions are expected to help increase the speed at which risk patterns in internal and external sources are analyzed. The implementation of…
-
"Facebook’s Libra: Cryptocurrencies in the Mainstream or a Hacker’s Paradise?"As Facebook's plans to introduce Libra, there are a few main questions. Does the introduction of cryptocurrency on Facebook signal cryptocurrencies entering the mainstream or will it be a hacker's paradise? Libra will allow…