cyber-defenses

Fostering Cyber-Defenses of Financial Institutions

0
The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has been fostering the cyber-defenses of financial institutions. This research-and-development effort will...
cyberthreats

Cyberthreats to UK Businesses – Industry Government Collaboration is Needed

0
The annual assessment of the biggest cyberthreats to U.K. businesses has been published recently, after being produced jointly for the first time by the...

“Organizations are surprised to find out how many applications are used...

0
Good Technologies unveiled a security system for mobile devices. Gartner declared recently that “MDM is dead” – is this really the situation on the market?...
situational awareness

Situational Awareness for Business Firms in War Zones

0
  A new security system which brings together up-to-the-minute information on key security developments in Iraq and the implications for companies operating in the region...
cyber

Public Sector Trying to Defend Itself in Cyber Environment

0
Distributed Denial of Service (DDoS) cyber attacks are a serious problem threatening companies and organizations across the globe. While weaponized data attacks on the...

Home depot all but confirms doozy of a data breach

0
Home Depot may have experienced a massive security breach, which affected an estimated 110 million people. Home Depot on Wednesday said it was investigating the possibility,...
mapping

New Mapping Solution for Improved Security Surveillance

0
A new geospatial mapping interface allows users to better comprehend physical location information. The use of static facility floor plans overlaid directly onto the...
authentication technology

Authentication Technology to Deliver Safer Transactions

0
Due to the rise of mobile transactions, passwords are not sufficiently secure as a means of authentication, and additional modes are required for next-generation...
Drone Pilots

Watch: New Sensor Will Detect Drone Pilots

0
A new sensor called RF-300 was released by Dedrone, that automatically locates drones and their pilots. The current ubiquity of drones makes for a very...
Image by Unsplash

Machine Learning Innovations Improve Financial Fraud Detection

0
A recent study published in the International Journal of Information and Communication Technology sheds light on the potential of machine learning and deep learning...
drone

New Chinese Drone Could Serve Government Agencies

0
A new Chinese drone known as the ‘Mavic 2 Enterprise’ drone now features swappable search and rescue accessories. The drone was upgraded specifically to...
Image by Pixabay

Incorporating Security Technologies in Critical Infrastructure Structural Systems, Public Buildings and...

0
Incorporating Security Technologies in Critical Infrastructure Structural Systems, Public Buildings and Real Estate Written by Or Shalom In the construction world, security has become a central...
image provided by pixabay

AI-Voice Robocalls Declared Illegal in the US

0
US regulators declared last week that scam "robocalls" made using voices created with artificial intelligence are now illegal. This phenomenon gained attention last month after...
Image by Unsplash

Cybercriminals Use Fake Google Ads to Steal User Credentials

0
Cybercriminals have been running a sophisticated phishing campaign using fake Google Ads to steal user credentials, researchers from Malwarebytes Labs have uncovered. These malicious...
image provided by Emotion Logic

The Truth Behind the Mask – the Revolutionary Algorithm that Recognizes...

0
Many industries nowadays want the ability to take the audio of a conversation and know the true feelings and hidden intentions of the speaker,...
Image by Unsplash

Russia Ransomware Campaigns Target Microsoft Teams Users

0
Sophos X-Ops, the threat research division of the British cybersecurity company Sophos, has revealed two active cyberattack campaigns targeting organizations that use Microsoft Office...
Image by Unsplash

Ghost Tap: A New NFC-Based Fraud Tactic Gaining Traction

0
In recent years, payment using NFC one's phone has become increasingly common, as it is a method both safer and more convenient than carrying...
Image by Pexels

OpenAI Unveils ChatGPT for Government Agencies

0
OpenAI has launched a new version of its popular AI tool, ChatGPT, tailored specifically to meet the needs of US government agencies. Dubbed ChatGPT...
Image by Unsplash

New System Ensures Secure IoT Data Transmission

0
As the Internet of Things (IoT) continues to expand, connecting devices across homes, industries, and urban environments, the need for secure, reliable data transmission...

Gmail Data Leak: 183 Million Reasons to Rethink Your Password Security

0
A new trove of stolen login credentials has surfaced online, with 183 million email addresses and passwords added to the “Have I Been Pwned”...
image provided by pixabay

The New AI-Based, Open-Source Solution to Combat Evasive Cyberattacks

0
As cyberattacks continue to rise globally, traditional security systems are struggling to keep up with increasingly sophisticated methods used by attackers. To counteract this,...
Image by Unsplash

Critical Windows Vulnerability Under Active Exploitation

0
A high-severity Windows vulnerability has been identified and is currently being exploited by threat actors. The flaw, tracked as CVE-2024-35250, lies in the Windows...

Latest

Metal That Behaves Like a Gel Could Redefine High-Temperature Systems

0
A research team at Texas A&M University has developed the world’s first metallic gel — a new class of material that combines the strength...