Home Blog Page 121
Image by Unsplash

New Discovery Revolutionizes Robotic Contact

0
On a daily basis, humans perform many physical tasks such as sitting down, picking items, and pushing objects around. While to us these tasks...
Image by pixabay

New Software Helps Autonomous Cars Make Ethical Decisions

0
Researchers at the Technical University of Munich (TUM) have developed autonomous driving software which distributes risk on the street in a fair manner. The algorithm...
Image provided by pixabay

The Quantum Threat – Closer Than We Think

0
While quantum computers have incredible potential to change the way we process information, they can also be used by our adversaries for nefarious means. The...
The pentagon. image provided by pixabay

Pentagon Struggles with Providing Effective Modern Software

0
New reports found that most US defense programs struggle to keep up with modern speed and deliver slow feedback to users. According to a new...
Cyber attack. image provided by pixabay

Cyber Attacks Targets Suicide Helpline

0
A cyber attack caused the abrupt outage of an American mental health helpline which lasted nearly a whole day, rendering the 988 lifeline unavailable. The...
cyber-brain. Image by pixabay

Computers Will Soon Talk Directly into Your Brain

0
According to reports, The Defense Advanced Research Projects Agency (DARPA) is currently developing computers that can be inserted into brains, in order to restore...
Image provided by pixabay

How Does Face ID Technology Look Today?

0
As biometric technology continues to develop faster and faster, promising safety and security to customers, so has facial recognition or face ID. Facial recognition...
Image provided by pixabay

Can AI Teach the Future Workforce?

0
The World Economic Forum predicts that by 2025, 50% of all workers worldwide will need to go through additional skill training in order to...
Image provided by pixabay

This Is What Top Security Leaders Have to Say

0
As terrorism runs rampant and natural disasters call for innovative emergency responses, experts in the field reflect on what's next to come and this...
military. image provided by pixabay

Smartphones Lead the Battlefield as Ukraine Overtakes Occupied City

0
The Russian Defense Ministry has issued a rare statement following a successful Ukrainian strike against a temporary based located in the occupied city of...
Image provided by pixabay

Buzzwords To Look Out For – Cyber Realm

0
According to a recently conducted interview with experts and executives from the cyber realm, here are a few buzzwords you should look out for...
cyber security. image provided by pixabay

Hacking The Hackers – FBI Infiltrates Ransomware Group

0
The US Attorney General has announced on that the FBI has dismantled a network of prolific ransomware actors, saving close to 130 million dollars...

Google Shuts Down Accounts Spreading Misinformation

0
Google threat analysis group terminated thousands of accounts which were linked to a pro-Chinese group that spread disinformation across social media. According to Google, the...
IoT. Image by pixabay

IoT As a Gateway for Cyber Criminals

0
Experts say 2022 may have marked an inflection point due to the rapid proliferation of IoT (Internet of Things) devices. Cyber-attacks are evolving from those...
Image provided by pixabay

Super Bowl Is a Major Target for Hackers

0
The American Super Bowl is one of the highest earning sport events in the world, with companies competing for ad space, even if that...
Image provided by pixabay

Cyber Crime Becomes World’s Thirds Largest Economy

0
Cybercrime has grown to become the world’s third-largest economy after the US and China, according to the World Economic Forum (WEF). Based on data...
Image provided by pixabay

Cost of Living Crisis Leads to Rise in Cyber Threats

0
In 2023, the global economic outlook is expected to worsen and the cost-of-living crisis might provide cyber criminals with the perfect opportunity to increase...
artificial-intelligence. image provided by pixabay

Generative AI Will Change How You See Autonomy

0
Generative AI is a category of artificial intelligence that uses algorithms to create ideas such as literature, graphics, music, and language models. It has...
Image provided by pixabay

Let’s Talk About Cyber Security Risk Management

0
Cyber security risk management is a strategic approach to prioritizing threats. Organizations implement cyber security risk management in order to ensure the most critical...
Image by pixabay

Digital Transformation and Why It Is So Important

0
Digital transformation is the process by which companies embed technologies across their businesses to drive fundamental change for the benefits of Increased efficiency, greater...
Image provided by pixabay

UK Cyber Agency Warn of Russian and Iranian Hackers

0
The UK National Cyber Security Centre (NCSC) published a warming this Thursday of phishing attacks led by Russian and Iranian state sponsored actors of...
image provided by pixabay

Fake Text Messages on The Rise

0
Experts warn that financial scams have become more sophisticated and easier to perpetrate, ballooning into a billion-dollar industry. Last year more than 239,000 scams worth...

Latest