Saturday, October 19, 2019
Home Cybersecurity

Cybersecurity

The biggest known biometric data breach to date was reported recently when researchers managed to access a 23-gigabyte database of more than 27.8m records including fingerprint and facial recognition data. The researchers, working with cyber-security firm VPNMentor, said that they had...
People around the world may be worried about nuclear tensions rising, but I think they’re missing the fact that a major cyberattack could be just as damaging – and hackers are already laying the groundwork. With the U.S. and Russia pulling out...
How could a small internet service provider (ISP) in Pennsylvania cause millions of websites worldwide to go offline? That’s what happened on June 24, 2019 when users across the world were left unable to access a large fraction of the web....
The people of Baltimore are beginning their fifth week under an electronic siege that has prevented residents from obtaining building permits and business licenses – and even buying or selling homes. A year after hackers disrupted the city’s emergency services dispatch system, city workers throughout the...
Recently, a neighbor asked one of us whether Russia, China, North Korea and Iran really are capable of hacking into the computers that control the U.S. electricity grid. The answer, based on available evidence, is “Yes.” The follow-up question was, “How expensive...
As cybersecurity incidents proliferate around the country and the globe, businesses, government agencies and the public shouldn’t wait for an inevitable disaster before investigating, understanding and preventing these failures.
Despite what every spy movie in the past 30 years would have you think, fingerprint and face scanners used to unlock your smartphone or other devices aren’t nearly as secure as they’re made out to be. While it’s not great...
Sixty-seven percent of smartphone users rely on Google Maps to help them get to where they are going quickly and efficiently. A major of feature of Google Maps is its ability to predict how long different navigation routes will take. That’s...
Every day, often multiple times a day, you are invited to click on links sent to you by brands, politicians, friends and strangers. You download apps on your devices. Maybe you use QR codes. Most of these activities are secure...
The world of cybersecurity has changed drastically over the past 20 years. In the 1980s, information systems security was a rather confidential field with a focus on technical excellence. The notion of financial gain was more or less absent...

RECENT POSTS