Tuesday, April 23, 2019
As cybersecurity incidents proliferate around the country and the globe, businesses, government agencies and the public shouldn’t wait for an inevitable disaster before investigating, understanding and preventing these failures.
Despite what every spy movie in the past 30 years would have you think, fingerprint and face scanners used to unlock your smartphone or other devices aren’t nearly as secure as they’re made out to be. While it’s not great...
Sixty-seven percent of smartphone users rely on Google Maps to help them get to where they are going quickly and efficiently. A major of feature of Google Maps is its ability to predict how long different navigation routes will take. That’s...
Every day, often multiple times a day, you are invited to click on links sent to you by brands, politicians, friends and strangers. You download apps on your devices. Maybe you use QR codes. Most of these activities are secure...
The world of cybersecurity has changed drastically over the past 20 years. In the 1980s, information systems security was a rather confidential field with a focus on technical excellence. The notion of financial gain was more or less absent...
Cybersecurity researchers and analysts  are  rightly worried that a new type of computer, based on quantum physics rather than more standard electronics, could break most modern cryptography.
Imagine you had a secret document you had to store away from prying eyes. And you have a choice: You could buy a safe made by a company that kept the workings of its locks secret. Or you could...
It can affect your organisation..... With the increase in popularity and value of cryptocurrencies interest in malicious cryptomining malware is also growing strong. Cryptocurrencies use cryptography to secure transactions and mint new virtual coins which are generated when computers loaded...
An April 2018 survey by the Pew Research Centre has found that fewer people believe that “the Internet has been mostly a good thing for society” as compared to four years ago. This worsening perspective on the social benefits...
Large-scale cyberattacks with eye-watering statistics, like the breach of a billion Yahoo accounts in 2016, grab most of the headlines. But what often gets lost in the noise is how often small and medium-sized organizations find themselves under attack. In...

RECENT POSTS