Facial-recognition technology, which matches photos of unidentified victims or suspects against enormous databases of photos, has long drawn intense criticism from privacy advocates. Now,...
Hackers are trying to take advantage of the Coronavirus fear with the goal of delivering malware and stealing information. The World Health Organization (WHO)...
Researchers from Ben-Gurion University of the Negev in Israel have figured out a way to steal information from an isolated computer not connected to...
Managing sensitive financial information and combating cyber threats are imperative for the safety and continuity of financial institutions. One of the major components of...
Foreign adversaries and cybercriminals are getting more aggressive and advanced, and cyberthreats have become an economic and security threat. However, the cybersecurity workforce shortage...
The European Union’s police agency has recently noted that cybercriminals are exploiting online vulnerabilities and utilizing new technology to target more profitable victims.
Europol has...
In April 2019, the PDF management service Lumin PDF suffered a data breach. The breach wasn't publicly disclosed until September when 15.5M records of...
Increasingly connected and automated vessels are becoming a cybersecurity challenge. In an incident last February, a deep draft vessel on an international voyage sailed...
The US is enhancing its stance towards cybersecurity. A new cybersecurity directorate is being established as the National Security Agency’s (NSA) foreign intelligence and...
Software vulnerabilities are frequently published on the web, for example on the US National Vulnerability Database — the official register of security vulnerabilities tracked...
Chinese espionage for western military technologies has reached a new stage. Chinese hackers have targeted over two dozen universities in the US and Canada...
Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...
Industries are beginning to adopt Internet of Things (IoT) technologies in unprecedented scopes. However, security concerns continue to threaten IoT’s progress. A study by...
We are in an era of intelligent and urgent urban innovation. Our homes are connected, our streets are thriving labyrinths of interconnectivity, and our...
Vehicle software is continuously gaining sophistication, creating new threat vectors in the process. As autonomous and connected vehicles become software driven, risks increase that...
In order to protect mobile devices and applications, US Federal agencies need security capabilities that proactively protect devices against all types of cyber attacks,...
In a quest to make online accounts safer, many services now offer two-factor authentication. Cybersecurity professionals have advised enabling two-factor to add an extra...