• Home
  • /Archive by category ' News '

Archive For: News

10 Technologies Poised to Change the Future

10 Technologies Poised to Change the Future

The MIT Technology Review has released its annual list of innovations that will have the largest impact on businesses and society in the coming years. The list is expansive covering industries including healthcare, renewable energy, self-driving vehicles, new forms of payment, cybersecurity and new powerful computing technologies. The MIT Technology Review is gathered using input ... Read More
 
Small Businesses Lag in Cyber Security Readiness

Small Businesses Lag in Cyber Security Readiness

Small businesses are lagging behind larger companies in preparedness for attacks on their websites or computer systems. That’s the finding of a survey by Hiscox, an insurance company whose target market in the U.S. is small business. The survey released last week found that small businesses are less likely to make changes to their cybersecurity ... Read More
 
The Black Market Value of Your Hacked PC

The Black Market Value of Your Hacked PC

By Brian Krebs, Security Researcher A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants ... Read More
 
The 9 Most In-Demand Programming Languages

The 9 Most In-Demand Programming Languages

1.    SQL It’s no surprise SQL (pronounced ‘sequel’) tops the job list since it can be found far and wide in various flavors. Database technologies such as MySQL, PostgreSQL and Microsoft SQL Server power big businesses, small businesses, hospitals, banks, universities. Indeed, just about every computer and person with access to technology eventually touches something ... Read More
 
Quantum Computing and the Evolution of Encryption

Quantum Computing and the Evolution of Encryption

Fear sells in the computer security business. And in late 2015 Massachusetts-based Security Innovation got an unexpected boost from one of the scariest organizations around—the National Security Agency. For six years the company had been trying to create a new revenue stream by licensing an unusual encryption technology called NTRU, which it acquired from four ... Read More
 
Voice Command Hacks, Coming Soon

Voice Command Hacks, Coming Soon

Voice interfaces are becoming more ubiquitous and are now the primary input method for many devices. We explore in this paper how they can be attacked with hidden voice commands that are unintelligible to human listeners but which are interpreted as commands by devices. We evaluate these attacks under two different threat models. In the ... Read More
 
Your Router Can Be Hacked Into a Global Botnet

Your Router Can Be Hacked Into a Global Botnet

You might want to upgrade the firmware of your router if it happens to sport the Netgear brand. Researchers have discovered a severe security hole that potentially puts hundreds of thousands of Netgear devices at risk. Disclosed by cybersecurity firm Trustwave, the vulnerability essentially allows attackers to exploit the router’s password recovery system to bypass authentication ... Read More
 
Education, Planning and Investment Can Deter a Cyber Security Attack

Education, Planning and Investment Can Deter a Cyber Security Attack

The topic of cyber security becomes more complicated on a daily basis. The more businesses learn, the more they realize they don’t know. There is, however, a starting point for businesses of all sizes that are beginning to realize their vulnerabilities and invest in protecting their networks. According to the Bureau of Labor Statistics, 50 ... Read More
 
Email Security in a Zero Trust World

Email Security in a Zero Trust World

WhitePaper Download The security landscape is more challenging than ever before. Rapidly evolving threats and hackers who are always one step ahead demand a security model that can adapt in real-time. Faced with this constant change, it is easy to become distracted by a blizzard of emerging technologies while leaving the back door open by ... Read More
 
MIT Researchers Use Machine Learning and AI to Mimic Human Facial Recognition

MIT Researchers Use Machine Learning and AI to Mimic Human Facial Recognition

Researchers at the Massachusetts Institute of Technology (MIT) have unveiled new research where it has developed a computational model aimed at capturing and mimicking the human aspects of facial recognition through artificial intelligence (AI) and machine learning systems, according to a report by ZDNet. The researchers, which hail from the MIT-headquartered Center for Brains, Minds, ... Read More