Security

Time to make you secure from FREAK VulnerabilityTime to make you secure from FREAK Vulnerability

Time to make you secure from FREAK Vulnerability

FREAK, a new major security flaw that left users of Apple and Google devices exposed to MITM attack while visiting…

10 years ago
Drones spying on cell phones for Advertizing campaignsDrones spying on cell phones for Advertizing campaigns

Drones spying on cell phones for Advertizing campaigns

The Singapore-based company AdNear is using a fleet of commercial drones to determine users' location and deliver hyper-targeted ads. Drones…

10 years ago
Twitter locked down Tor by requiring a phone number for sign-upTwitter locked down Tor by requiring a phone number for sign-up

Twitter locked down Tor by requiring a phone number for sign-up

Internet users that want to create a new account on Twitter through the Tor network must now provide a phone…

10 years ago
FREAK, the new vulnerability that threatens the IT industryFREAK, the new vulnerability that threatens the IT industry

FREAK, the new vulnerability that threatens the IT industry

FREAK, a new major security flaw that left users of Apple and Google devices exposed to MITM attack while visiting…

10 years ago
Weaknesses in Air Traffic Control Systems are a serious issue for FAAWeaknesses in Air Traffic Control Systems are a serious issue for FAA

Weaknesses in Air Traffic Control Systems are a serious issue for FAA

A GAO report to FAA reveals that the systems adopted in the Aviation industry are still affected by weaknesses that…

10 years ago
Cognitive Fingerprints, the new frontier of authenticationCognitive Fingerprints, the new frontier of authentication

Cognitive Fingerprints, the new frontier of authentication

DARPA is working on Cognitive Fingerprints authentication process to validate the user identity through the use of software based biometrics.…

10 years ago
Cyber criminals target call center operators in Apple Pay fraud schemaCyber criminals target call center operators in Apple Pay fraud schema

Cyber criminals target call center operators in Apple Pay fraud schema

Cybercriminals are targeting call centers operators in Apple Pay fraud to circumvent the checks implemented by Apple, banks and card…

10 years ago
Hacking the hackers : A cyber resilience approachHacking the hackers : A cyber resilience approach

Hacking the hackers : A cyber resilience approach

A cyber resilience approach: the need to become cyber resilient is very essential because eliminating risks completely is impossible. Hacking…

10 years ago
Facebook Policies and New Terms of Use Have Been under Scrutiny in EuropeFacebook Policies and New Terms of Use Have Been under Scrutiny in Europe

Facebook Policies and New Terms of Use Have Been under Scrutiny in Europe

A recent report about the privacy policy of Facebook has shed light to potential problems and disagreements with legal concerns…

10 years ago
Shadow Cloud Services a serious risk for Government NetworksShadow Cloud Services a serious risk for Government Networks

Shadow Cloud Services a serious risk for Government Networks

Cloud Security Alliance revealed that shadow cloud service used by employees and unmanaged by IT can pose a major security…

10 years ago