Cyber Security

Cyber Security

image by pixabay

A new scanning tool was developed by an international team of researchers to boost cyber security and make websites less vulnerable to hacking and...
Cyber space. image by pixabay

Last year marked a turning point in the fight against ransomware as the collaboration among law enforcement agencies led to high-profile arrests, and the...
Airplane. image by pixabay

The US Air Force needs to rapidly and efficiently field enhanced war-fighting capability in order to maintain technological advantage in highly contested and consistently...
vr headset. image by pixabay

In February 2022, Gartner predicted that 25 percent of people will spend at least one hour per day in the metaverse by 2026. Backed...
united states capitol. image by pixabay

According to reports, only 1% of defense firms in the US utilize Department of Defense's security services. Why is that? Although US companies must adhere...
Security. image by pixabay

The Internet of Things, or IoT, is made up of interconnected sensors and devices networked with computers. Alongside consumer devices like smartwatches etc, many...
automotive. image by pixabay

The autonomous, connected, electric and shared (ACES) trends bring new requirements that modern automotive operating systems need to be capable of handling. The growing...
photo illus. cybersecurity by Pixabay

Cyber security is often associated with protecting data, but hackers are increasingly targeting physical devices. A technology under development makes digital chips more resilient...
internet. image by pixabay

From increasing the safety of roads, cars and homes, to fundamentally improving the way we manufacture and consume products, IoT solutions provide valuable data...
IoT. image by pixabay

The manufacturers of connected systems, interested in defending their code and data in the Internet of Things realm will now have another channel to...
iot. image by pixabay

Internet of Things (IoT) devices use the internet to communicate, collect, and exchange information. It’s only natural that as these device numbers grow, the...
cybercriminals targeting profit

While deep learning algorithms may be looking promising for identifying and characterizing cybersecurity intrusions, various attacks can cause them to provide inaccurate information, or...
Smart phone.image by pixabay

If you think your smartphone is safe as long as no one touches it, you are wrong. While yes, many attacks on smartphones require...
infrastructure. image by pixabay

As protecting critical infrastructure from cyber attacks has become vital and a major mission in a world where cyber attacks have been targeting more...
spyware. image by pixabay

Researchers at the Indian Institute of Technology Madras have developed an innovative algorithm to mitigate disruptions in critical networks such as air traffic control...
image by pixabay

The technology used for salespeople documentation and evaluation is now helping police departments. The vast majority of police body camera footage never gets reviewed,...
Cyber Security. image by pixabay

While cyber criminals are constantly changing their tactics, legislation and standardization often take years, leaving law enforcement efforts without substantial countermeasures. Now, Europe is...
hackers. image by pixabay

Over the past few years, machine learning has gained popularity, and it is being integrated with more and more technologies and tools. A major...
echo-dot. image by pixabay

Privacy preserving methods are becoming increasingly important in enhancing consumer privacy and security as voice technologies become part of daily life. Consumers use voice...
Cyber security. image by pixabay

In the 21st century, technology has become an integral part of our lives. We are constantly exposed to it on a daily basis, and...
computing. image by pixabay

Overworked security operations teams, the increasing frequency of large-scale ransomware attacks, paired with the shift to a new era of hybrid work, have created...
drone. image by pixabay

Unmanned aerial vehicles face a wide range of threat vectors in cyber space while they are in flight, including the potential for an adversary...