The Federal Communications Commission (FCC) has proposed a cybersecurity labeling program to better protect users of smart devices, with the new initiative covering any...
Researchers from universities in China and Singapore revealed a security gap that permits malicious snoops to steal your password through keystroke identification, in what...
There is a newly discovered vulnerability in text messaging that might possibly let malicious actors trace users’ location, according to cybersecurity Ph.D. student Evangelos...
TETRA is a radio technology that is used by law enforcement, the military, critical infrastructure, and industrial companies, and it is apparently littered with...
China recently successfully launched its first communications satellite with flexible solar panels. There were also three remote sensing satellites onboard the Long March-2D rocket...
Many people already use fingerprint recognition technology to access their phones, but new research demonstrates a technique that maps out not only the unique...
Researchers found new critical vulnerabilities in various automotive giants such as Tesla, Ferrari, BMW, Toyota, and others. The researchers found a compromise in a...
We need to shift from ‘Defense-in-Depth’ strategies to incorporate ‘Resilience-in-Depth’ strategies, which offers a new cyber defense strategy that places multiple layers of security...
By using machine learning and rule-based algorithms, network traffic analysis is the process of analyzing network traffic. It enables the network to be monitored...
The ubiquity of smartphones combined with the developing trend toward smart living will make biometrics an important element to incorporate into homes of the...
The Internet of Vehicle (IoV) field allows vehicles to communicate with drivers, other vehicles, management systems, pedestrians, other smart devices, and infrastructure, all in...
Fraud has become an ongoing threat and concern for the telecom industry. Approximately 40B$ are lost annually to fraud in telecoms worldwide, and this...
With the world of security constantly changing and hackers adapting to those changes, nothing is perfect in terms of security. While two-factor authentication is...
Internet of Things (IoT) devices use the internet to communicate, collect, and exchange information. It’s only natural that as these device numbers grow, the...
The autonomous, connected, electric and shared (ACES) trends bring new requirements that modern automotive operating systems need to be capable of handling. The growing...