-
"Healthcare Overconfident in Privacy Maturity, As Breach Rate Rises"Integris researchers conducted a survey to which 258 top business executives and IT decision makers who work in medium-sized to large-sized healthcare organizations responded. Results of the survey reveal that most healthcare organizations are overly…
-
"Three Quarters of Mobile Apps Have This Security Vulnerability Which Could Put Your Personal Data at Risk"According to Positive Technologies' Vulnerabilities and Threats in Mobile Applications 2019 report, most iOS and Android applications contain vulnerabilities that could allow hackers to steal sensitive data. These vulnerabilities derive from insecure…
-
"Google Turns to Retro Cryptography to Keep Data Sets Private"An open source cryptographic tool, called Private Join and Compute, has been released by Google to bolster the privacy of confidential data sets. The multi-party computation (MPC) tool was designed to help organizations with confidential data sets…
-
"Report on Cognitive Security Market, Trend, Segmentation and Forecast 2026"The growing frequency of cyberattacks has resulted in more interest in cognitive security. Cognitive security solutions are expected to help increase the speed at which risk patterns in internal and external sources are analyzed. The implementation of…
-
"Facebook’s Libra: Cryptocurrencies in the Mainstream or a Hacker’s Paradise?"As Facebook's plans to introduce Libra, there are a few main questions. Does the introduction of cryptocurrency on Facebook signal cryptocurrencies entering the mainstream or will it be a hacker's paradise? Libra will allow…
-
"These Wi-Fi Extenders Had Vulnerabilities That Gave Hackers Complete Control"According to security researchers from IBM, Wi-Fi extenders from the router company, TP-Link, contain a critical vulnerability that could allow attackers to take over them. Through the exploitation of this vulnerability, attackers could perform malicious…
-
"SUTD Researchers Enhance Security In Proof Of Stake Blockchain Protocols"Blockchain technology has attracted much attention from banks, governments, and techno-corporations as the technology has the potential to improve upon security and privacy. Proof of Stake (PoS) is a consensus algorithm used in Blockchain technology to…
-
"Research Shows Tesla Model 3 and Model S are Vulnerable to GPS Spoofing Attacks"During a study, researchers were able to remotely affect various aspects of the driving experience of the Tesla Model 3, including navigation, mapping, power calculations, and the suspension system, through GPS spoofing. During a test drive using Tesla’s…
-
"Hack Your State Department Act Introduced in Senate"Senators, Cory Gardner (R-CO) and Ed Markey (D-MA), recently introduced the Hack Your State Department Act. The legislation would establish a process for the general public to properly disclose vulnerabilities that they find in the Department of State's…
-
"Eliminating Infamous Security Threats"A new solution to speculative memory side-channel attacks such as Meltdown and Spectre has been proposed by researchers from Uppsala University, NTNU, and the University of Murcia. The security vulnerability used to execute speculative memory side-…
-
"New Cyber Protection Technology Moves from the Lab to the Marketplace"The MIT Lincoln Laboratory developed technology aimed at providing protection for commodity software applications such as browsers, business tools, and document readers, from cyberattacks. The technology, called Timely Randomization Applied to…
-
"Quantum – a Double-Edged Sword for Cryptography"Quantum computers are expected to lead to highly secure cryptography. However, these computers are also expected to break current encryption algorithms as a result of their quantum-mechanical properties that could allow them to calculate at a much faster…
News