Data Security

Data Security

images provided by pixabay

Canada’s Supreme Court rules that the Canadian police won’t be able to access an IP address without a search warrant. This case was brought to...
Images provided by pixabay

China reportedly intends to improve the data security of its industrial sector in order to effectively contain any “major risks,” a process that is...
image provided by pixabay

The Remember Me checkbox promises online users a convenient, one-time log in, but using this feature has various security implications. Research released by the...
Image provided by pixabay

The expansion of the digital realm into space has opened new frontiers for cyber threats, posing unprecedented challenges. The satellites orbiting Earth are crucial for...
image provided by pixabay

Hackers can now create clones of WiFi hotspots and intercept data, as well as enable unauthorized access to protected home Wi-Fi networks and expose...
image provided by pixabay

MIT developers invent new tamper-proof ID tag that provides cheap and secure authentication – a cryptographic chip that is smaller and cheaper than RFID...
image provided by pixabay

The US Department of Justice claims to have taken down a global botnet controlled by GRU, Russia’s military intelligence agency. The botnet reportedly consisted...
Hardware. image by pixabay

A major new report calls for the regulation of the hardware that underpins all AI ("compute") to help prevent artificial intelligence misuse and disasters. Several...
images provided by pixabay

HP Wolf Security’s latest threat insights disclosure put a spotlight on DarkGate – a group of web-based criminals using legal advertising tools to enhance...
images provided by pixabay

Microsoft claims US adversaries like Iran, North Korea, Russia, and China are beginning to use generative AI to organize offensive cyber operations. The tech giant...
image provided by pixabay

Social media platforms on the internet are constantly flooded with huge amounts of content, and this vast ocean of material needs to be constantly...
image provided by pixabay

Artificial intelligence tools for the general public (ChatGPT, Bard, Dall-E) are being widely used for many everyday tasks, but users with malicious intentions can...
image provided by pixabay

US regulators declared last week that scam "robocalls" made using voices created with artificial intelligence are now illegal. This phenomenon gained attention last month after...
image provided by pixabay

Some experts claim that there is no current evidence that AI can be controlled safely. And if so, should it even be developed? AI Safety...
image provided by pixabay

Security cameras are our first line of defense in many fields of life, from our homes to the bank. But what if they aren't...
data and cyber. image by pixabay

A mere misconfigured database has exposed more than two million user records on LectureNotes Learning App, a platform for sharing class notes. Back in December...
image provided by pixabay

The rise of ransomware-as-a-service gangs has brought with it a surge of 68% in known ransomware attacks last year, a record level, according to...
image provided by pixabay

Flysmart+ is an iOS app for pilots to calculate aircraft takeoff performance, weight, and balance, developed by the Airbus subsidiary Navblue. It was recently...
image provided by pixabay

Facial recognition is technology that can identify or verify a person's identity based on their face, and can be used for various purposes, like unlocking smartphones,...
smart city. image by pixabay

Smarter eco-cities are intelligent urban environments that leverage cutting-edge Artificial Intelligence of Things (AIoT) solutions to address and mitigate environmental challenges. The integration of AIoT...
image provided by pixabay

Study finds that businesses with cybersecurity insurance face significantly higher ransom payments compared to businesses that are not insured. According to Dutch victim data, the...
image provided by pixabay

Charles Harry is a former National Security Agency cyberwarfare expert and director of the University of Maryland's Center for Governance of Technology and Systems,...