Cyber Crime

Cyber Crime

Facial-recognition technology, which matches photos of unidentified victims or suspects against enormous databases of photos, has long drawn intense criticism from privacy advocates. Now,...

Hackers are trying to take advantage of the Coronavirus fear with the goal of delivering malware and stealing information. The World Health Organization (WHO)...

Researchers from Ben-Gurion University of the Negev in Israel have figured out a way to steal information from an isolated computer not connected to...

Managing sensitive financial information and combating cyber threats are imperative for the safety and continuity of financial institutions. One of the major components of...
cybersecurity

Foreign adversaries and cybercriminals are getting more aggressive and advanced, and cyberthreats have become an economic and security threat. However, the cybersecurity workforce shortage...
cybercriminals targeting profit

The European Union’s police agency has recently noted that cybercriminals are exploiting online vulnerabilities and utilizing new technology to target more profitable victims. Europol has...
Photo illustration Pixabay

In April 2019, the PDF management service Lumin PDF suffered a data breach. The breach wasn't publicly disclosed until September when 15.5M records of...
photo port illust Pixabay

Increasingly connected and automated vessels are becoming a cybersecurity challenge. In an incident last February, a deep draft vessel on an international voyage sailed...
Photo illust

The growing network of the internet of things (IoT) can make life more convenient by automating your home and delivering data wherever you are....
cyber attack illust.

The US is enhancing its stance towards cybersecurity. A new cybersecurity directorate is being established as the National Security Agency’s (NSA) foreign intelligence and...
russian hackers

Russian hacking attacks leave the victim with a mere 19 minutes to respond to an attack, according to data published by computer security company...
security

Software vulnerabilities are frequently published on the web, for example on the US National Vulnerability Database — the official register of security vulnerabilities tracked...
hackers

Chinese espionage for western military technologies has reached a new stage. Chinese hackers have targeted over two dozen universities in the US and Canada...
passwords

Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...
iot

Industries are beginning to adopt Internet of Things (IoT) technologies in unprecedented scopes. However, security concerns continue to threaten IoT’s progress. A study by...
smart cities

We are in an era of intelligent and urgent urban innovation. Our homes are connected, our streets are thriving labyrinths of interconnectivity, and our...
data breach

More than 87GB of passwords and email addresses have been leaked and distributed in a folder dubbed "Collection #1" by hackers in a significant...

Summary of 2018 2018 has begun with a recovery from the events of 2017 such as WannaCry, Petya, and the information leak from Equifax -...

Vehicle software is continuously gaining sophistication, creating new threat vectors in the process. As autonomous and connected vehicles become software driven, risks increase that...

In order to protect mobile devices and applications, US Federal agencies need security capabilities that proactively protect devices against all types of cyber attacks,...
two-factor

In a quest to make online accounts safer, many services now offer two-factor authentication. Cybersecurity professionals have advised enabling two-factor to add an extra...
data breaches

Data breaches compromised the personal information of millions of people around the globe in 2018. Data breaches are...