Data Security

Data Security

image provided by pixabay

The rise of ransomware-as-a-service gangs has brought with it a surge of 68% in known ransomware attacks last year, a record level, according to...
image provided by pixabay

Flysmart+ is an iOS app for pilots to calculate aircraft takeoff performance, weight, and balance, developed by the Airbus subsidiary Navblue. It was recently...
image provided by pixabay

Facial recognition is technology that can identify or verify a person's identity based on their face, and can be used for various purposes, like unlocking smartphones,...
smart city. image by pixabay

Smarter eco-cities are intelligent urban environments that leverage cutting-edge Artificial Intelligence of Things (AIoT) solutions to address and mitigate environmental challenges. The integration of AIoT...
image provided by pixabay

Study finds that businesses with cybersecurity insurance face significantly higher ransom payments compared to businesses that are not insured. According to Dutch victim data, the...
image provided by pixabay

Charles Harry is a former National Security Agency cyberwarfare expert and director of the University of Maryland's Center for Governance of Technology and Systems,...
image provided by pixabay

Deepfakes and tempered audio can now be created with the press of a button and are therefore much more dangerous. New research by School...
image provided by pixabay

The growing trend of AI-generated content and deep fakes is making us lose our trust in the internet. Can identity decentralization be the solution?...
image provided by pixabay

The impact of AI on cybersecurity is transforming the methods we use to secure digital platforms. It is both providing attackers with sophisticated new...
images provided by pixabay

Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
image provided by pixabay

Account takeover attacks consist of a hacker gaining unauthorized access to online accounts. Computer science researchers developed a new way to identify security weaknesses...
image provided by pixabay

The EU has proposed a law to regulate AI, but human rights activists warn that it won’t be enough to protect the public from...
image provided by pixabay

Microsoft was attacked by the Russian hacking group Midnight Blizzard, which reportedly broke into its corporate networks on January 12 and stole some sensitive...
image provided by pixabay

Smartphone ambient light sensors are used to automatically adjust screen brightness, but researchers reveal that they can be turned into cameras and used to...
image provided by pixabay

IBM claims that quantum computers will wreak havoc on the world of cybersecurity by the end of the decade, and governments and businesses are...
image provided by pixabay

AI urbanism is a new field of research looking at the impact of AI on cities. It is different from a "smart city," which...
image provided by pixabay

Large language models (known as LLMs) are deep learning-based models that are trained to generate, summarize, translate, and process written texts. While such models...
image provided by pixabay

Chinese state-backed experts found a way to identify people who use Apple's encrypted AirDrop messaging service. Apple’s AirDrop service lets users send content to other...