Home Blog Page 125

Adversarial AI – Who Monitors Artificial Intelligence?

0
Today, more and more systems are enveloping us in our daily lives. From autonomous cars to charging your phone, all these actions create information...
call-centre. image provided by pixabay

Solution to Telecom Fraud Attacks

0
Fraud has become an ongoing threat and concern for the telecom industry. Approximately 40B$ are lost annually to fraud in telecoms worldwide, and this...

Password Manager Gets Hacker, Encrypted Passwords Stolen

0
On August 25, 2022, LastPass published an official statement notifying customers that a third-party gained unauthorized access to portions of their development environment, source...

UK Government Bans Chinese CCTV Provider

0
A decision made by the UK government called for a ban on the use of the largest CCTV provider in the world due to...

Cyber Crime In 2023 – What Can We Expect?

0
Cyber crime costs in 2025 are expected to reach $10.5 trillion in 2025 with some industries being more vulnerable to cyber attacks than others,...
cyber security. image by pixabay

Ransomware Attack Threats – Cyber Security Epidemic

0
Ransomware attacks have become the mainstay of a billion-dollar industry that targets businesses including major multinational corporations, schools, government agencies and even hospitals. Increasingly,...

Reseachers Have Changed The Way We Do THIS

0
A new technology uses artificial intelligence to create a digital 3D scene out of a set of 2D images in seconds. NVIDIA's AI researchers...
Cyber attack. image by pixabay

Corporations Against Ransomware – Leads to High-Profile Arrests

0
Last year marked a turning point in the fight against ransomware as the collaboration among law enforcement agencies led to high-profile arrests, and the...
robot. image by pixabay

Machine Learning Systems Are Vulnerable – No Doubt About It

0
Based on a published NCC (National Computing Center) whitepaper, the growing number of organizations creating and deploying machine learning solutions is highly concerning. The...
Cybersecurity illus. by Pixabay

How Decision Makers Face Challenges With Cyber Security

0
A game-changing cybersecurity technology is bringing about a new era, claims the US Army Combat Capabilities Development Command (DEVCOM). US Army researchers are creating...
Hologram VR. image by Pixabay

Metaverse Is Not As Safe As You Might’ve Thought

0
In February 2022, Gartner predicted that 25 percent of people will spend at least one hour per day in the metaverse by 2026. Backed...
IoT. image by pixabay

Needed Now More Than Ever

0
Cyber security is often associated with protecting data, but hackers are increasingly targeting physical devices. A technology under development makes digital chips more resilient...
security. image by pixabay

Two-Factor Authentication Is A Must!

0
With the world of security constantly changing and hackers adapting to those changes, nothing is perfect in terms of security. While two-factor authentication is...
cyber security. image by pixabay

What Do The Experts Say?

0
Cyber attacks against industrial players, providers of critical infrastructure and facilities, and energy corporations - whether oil, natural gas, or renewable energy - are...
Iranian civillians. image by pixabay

Iran Uses Civillian Airlines to Transfer Deadly Weapons

0
Iran has been using civilian airlines to transport military weapons such as attack UAVs and ballistic missiles to Syria for years, through the Iraqi...
Image by Pixabay

What About Big Data?

0
Sensors can provide huge amounts of information about an environment. Video from unmanned aerial vehicles (UAVs) and social media posts could provide valuable information...
cybercriminals targeting profit

Deep Learning – Weaknesses and Vulnerabilities

0
While deep learning algorithms may be looking promising for identifying and characterizing cybersecurity intrusions, various attacks can cause them to provide inaccurate information, or...
iot. image by pixabay

When AI And IOT Collaborate

0
Internet of Things (IoT) devices use the internet to communicate, collect, and exchange information. It’s only natural that as these device numbers grow, the...
communications

Protect Your Smartphone

0
If you think your smartphone is safe as long as no one touches it, you are wrong. While yes, many attacks on smartphones require...
Cyber Security. image by pixabay

Major Spyware Effecting Key Web Browsers Discovered

0
Google has discovered a new commercial spyware that exploits vulnerabilities in Google Chrome, Mozilla Firefox, and Microsoft Defender. The Google Threat Analysis Group (TAG)...
vr headset. image by pixabay

Tech Giant Will Provide US Army With AR Headsets

0
Microsoft is expected to build mixed-reality (virtual and augmented reality) headsets for the US Army. A new prototype by the name of IVAS -...

Latest