Many people use simple and weak passwords for their devices, making it easy for intruders to hack their phones, computers, emails etc. Many employees...
Border threats have been creating various challenges, met by innovative control technologies. New systems deliver high security and fast passenger processing times in border...
A recent spate of breaches involving in-home Ring security cameras, owned by Amazon, in several states across the US have raised concerns that these...
Industrial connected devices, the Industrial IoT, is a real opportunity for industries to share efficiently their resources and increase their productivity. However, network sharing...
The rapidly growing world of connected smart devices presents enormous security risks and the existing security solutions find it hard to keep pace. Be...
In April 2019, the PDF management service Lumin PDF suffered a data breach. The breach wasn't publicly disclosed until September when 15.5M records of...
How do you translate the powerful consumer technology of smartphones into something that can be useful and secure on the battlefield? Soldiers need something...
Increasingly connected and automated vessels are becoming a cybersecurity challenge. In an incident last February, a deep draft vessel on an international voyage sailed...
Some experts expect Earth to pass the threshold of 1 trillion internet-connected sensors within five years, so there is growing pressure to improve the...
Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...
BlackBerry’s Security Credential and Management System (SCMS) lets autonomous vehicles communicate with wired objects in the Intelligent Traffic Systems, as part of the Smart...
In a quest to make online accounts safer, many services now offer two-factor authentication. Cybersecurity professionals have advised enabling two-factor to add an extra...
In an attempt to target Islamist terrorism, pedophile networks and organized crime, several governments worldwide have been leading a policy forcing technology companies to...