Saturday, July 20, 2019
Home Cybersecurity

Cybersecurity

The people of Baltimore are beginning their fifth week under an electronic siege that has prevented residents from obtaining building permits and business licenses – and even buying or selling homes. A year after hackers disrupted the city’s emergency services dispatch system, city workers throughout the...
Recently, a neighbor asked one of us whether Russia, China, North Korea and Iran really are capable of hacking into the computers that control the U.S. electricity grid. The answer, based on available evidence, is “Yes.” The follow-up question was, “How expensive...
As cybersecurity incidents proliferate around the country and the globe, businesses, government agencies and the public shouldn’t wait for an inevitable disaster before investigating, understanding and preventing these failures.
Despite what every spy movie in the past 30 years would have you think, fingerprint and face scanners used to unlock your smartphone or other devices aren’t nearly as secure as they’re made out to be. While it’s not great...
Sixty-seven percent of smartphone users rely on Google Maps to help them get to where they are going quickly and efficiently. A major of feature of Google Maps is its ability to predict how long different navigation routes will take. That’s...
Every day, often multiple times a day, you are invited to click on links sent to you by brands, politicians, friends and strangers. You download apps on your devices. Maybe you use QR codes. Most of these activities are secure...
The world of cybersecurity has changed drastically over the past 20 years. In the 1980s, information systems security was a rather confidential field with a focus on technical excellence. The notion of financial gain was more or less absent...
Cybersecurity researchers and analysts  are  rightly worried that a new type of computer, based on quantum physics rather than more standard electronics, could break most modern cryptography.
Imagine you had a secret document you had to store away from prying eyes. And you have a choice: You could buy a safe made by a company that kept the workings of its locks secret. Or you could...
It can affect your organisation..... With the increase in popularity and value of cryptocurrencies interest in malicious cryptomining malware is also growing strong. Cryptocurrencies use cryptography to secure transactions and mint new virtual coins which are generated when computers loaded...

RECENT POSTS