Hacking Biometric Facial Recognition
Are biometric authentication measures no longer safe? Biometric authentication expert says deepfake videos and camera injection attacks are changing the game.
Biometrics authentication is getting...
Malware – Biggest Threat to Business
In 2022 alone, cyber criminals managed to access over 22 million devices and exposed over 720 million credentials.
The prevalence of botnets in raising these...
Fake News and Twitter’s Controversial Change
According to recent updates by Elon Musk, Twitter will soon remove verification for those who refuse to pay.
For those of you unfamiliar with Twitter's...
Should You Use A Password Manager?
While password managers are mostly considered safe to use and even often recommended as an efficient security tool and password storage, consider these following...
What To Expect – Rising Trends In Security For 2023
According to HID Global, an expert in trusted identity and physical security solutions, these following trends will impact the security and identity industry.
Continuing...
Beware of This Unexpected Malware
Approximately 57% of breaches targeting financial institutions worldwide this year have been attributed to ‘general hacking', according to a financial yearly review by Flashpoint....
Will Identification Technology Lead To 3D Recognition?
Many people already use fingerprint recognition technology to access their phones, but new research demonstrates a technique that maps out not only the unique...
Top Five Technology Trends You Must Look Out For
In the next decade, technological innovation will have more and more impact on our lives in many fields. Technological innovation opens up new opportunities,...
Your Password Is Weak Against Hackers – What Can You Do?
Even in such a developed and still advancing digital world like ours, we still don’t seem to be able to ditch passwords. Undenounced to...
Top Cyber Security Threats Against Your Company for 2023
For 2023, we must be more prepared to face the ever-growing cyber threats against us. Major corporations and company have been hit by cyber-attacks...
Federal Inspection Reveals How Weak Our Passwords Are
Recently, a report published by the US Department of Interior following an investigation by the Inspector General has showcased that 21% of the entire...
Can Smartphones Recognize You By Your Ear?
The ubiquity of smartphones combined with the developing trend toward smart living will make biometrics an important element to incorporate into homes of the...
Password Manager Gets Hacker, Encrypted Passwords Stolen
On August 25, 2022, LastPass published an official statement notifying customers that a third-party gained unauthorized access to portions of their development environment, source...
Two-Factor Authentication Is A Must!
With the world of security constantly changing and hackers adapting to those changes, nothing is perfect in terms of security. While two-factor authentication is...
Privacy Settings – NOT As Private As You Think
After years of Apple claiming the iPhone to be the most secure smartphone device on the market, a new privacy lawsuit might show otherwise....
First-of-its-Kind in IoT
The manufacturers of connected systems, interested in defending their code and data in the Internet of Things realm will now have another channel to...
Enough With the Cannabis Texts!
The Israeli Minister of Communications Yoaz Hendel has announced that the Ministry of Communications has begun its' efforts to put an end to the...
What Are The Top Most Popular Cyber Security Methods?
In the 21st century, technology has become an integral part of our lives. We are constantly exposed to it on a daily basis, and...
Technology Giant Stands Behind These Innovative Eye Tracking Devices
Only this year Apple was granted a patent for one of their acquired eye-tracking patents from SMI SensoMotoric Instruments GmbH. The company's top engineer,...
Military Focuses On Operational Biometric Authentication
Advancing wearable technology for user authentication - that’s the focus of a new mission of the U.S. Army’s tactical network modernization team. “Try to...
Top Secret Networks Are Protected Using This Tool
With so many employees now working remotely, the cyber attack surface has been increasingly expanding. Officials at the US Defense Information Systems Agency say...
These Companies Are Vulnerable To Phishing Attacks
A report by the Public Utilities Regulatory Authority found that phishing attacks remained the largest source of successful cyberattacks and pose a significant risk...