-
"Three Ways GDPR Benefits US Companies"The European Union's General Protection Regulation (GDPR) went into effect on May 25, 2018. The purpose of the GDPR is to ensure the protection of personal data belonging to EU residents by enforcing a standard upon any companies that manage this data.…
-
"Despite warnings, most people still don’t change their passwords"1050 individuals were surveyed about their passwords. It was discovered that 64% of people used the same password for some, or even all, of their online accounts, while only 21% used a different password for each account. 21% of the…
-
"Artificial Intelligence May Not 'Hallucinate' After All"Great advancements have been made in machine learning in regard to image recognition as this technology can now identify objects in photographs as well as generate authentic-looking fake images. However, the machine learning algorithms used by image…
-
"This Ransomware Sneakily Infects Victims by Disguising Itself With Anti-Virus Software"According to cybersecurity researchers at Trend Micro, ransomware, called Dharma, which emerged in 2016, has been updated to deceive users into installing it by posing as anti-virus software. New details pertaining to the updated version of Dharma…
-
"Study Finds Wi-Fi Location Affects Online Privacy Behavior"A team of scientists conducted a study to see if a person's location offline affects how they behave online in regard to privacy. The study also explores changes in online privacy behavior resulting from the presence of a virtual private network (VPN)…
-
"Bypassing Popular Passwords"A new model for password protection has been proposed by Jaryn Shen and Qinqkai Zeng of the State Key Laboratory for Novel Software Technology, and Department of Computer Science and Technology, at Nanjing University, China. The new approach is aimed to…
-
"The IoT threat landscape is expanding rapidly, yet few companies are addressing third party risk factors"There is a dramatic increase in IoT-related data breaches specifically due to an unsecured IoT device or application since 2017. It has jumped from 15 percent to 26 percent, and the results might actually be greater, because most organizations…
-
"Critical flaw allows attackers to take over Cisco Elastic Services Controllers"Cisco had a critical flaw which allowed attackers to take over Cisco Elastic Services Controllers (ESC). ESC is a popular enterprise software for managing virtualized resources. The vulnerability is due to improper validation of API requests.…
-
"Flaws in Metrics for User Login Systems"A study conducted at Rutgers University-New Brunswick brings further attention to flaws in the metrics used to measure the performance of user login systems. In addition to highlighting these flaws, the study proposes a solution towards measuring the…
-
"Unhackable? New chip makes the computer an unsolvable puzzle"A new computer processor architecture called MORPHEUS could usher in a future where computers proactively defend against threats. It would be able to render the current electronic security model of bugs and patches obsolete. …
-
"Industry Warns of Flaws as Gov’t Proposes Mandatory IoT Security Labelling"The UK government is considering establishing an IoT security labelling scheme, which will help inform consumers about how secure IoT products are. The consultation suggests three security requirements laid out by the UK government's "Secure by Design"…
-
"50,000 Companies Exposed to Hacks of 'Business Critical' SAP Systems: Researchers"New ways of exploiting vulnerabilities in SAP software have been discovered by security researchers. These vulnerabilities leave the 50,000 companies that use this software susceptible to being hacked. The exploitation of these vulnerabilities could…
News