Researchers Use Machine Learning, Cybersecurity Practices to Secure US Power Grid

In 2015, Russian hackers shut down Ukraine’s electrical grid after infecting the infrastructure with malware. It was only a matter of time until they would target the US power system. As of 2016, US critical operational infrastructures have been under siege by "Russian government cyber actors," as described by the Department of Homeland Security and the FBI.
Read more

What is a Password Manager and Why Do You Need it?

Do you use the same password for all of your online accounts, apps and services—like email, social media, online retail sites or even your bank? Is this password your date of birth, your high school mascot, your pet’s name, or some other easily guessed or discovered piece of trivia from your life? If your answer The post What is a Password Manager and Why Do You Need it? appeared first on TechSpective.
Read more

5G Security Challenges and Ways to Overcome Them

As the world waits for the introduction of 5G networks, the industry gears up to address the security challenges that may accompany 5G. The 5G networks would essentially promote the use of a huge number of interconnected devices, a tremendous increase in bandwidth, and collaborative functioning of legacy and new access technologies. Undoubtedly, the upcoming The post 5G Security Challenges and Ways to Overcome Them appeared first on Radware Blog.
Read more

User photo tagging brings major class action lawsuit for Facebook

Users have accused Facebook of violating an Illinois privacy law by using facial recognition on photos without explicit user consent. Now, a US federal judge in San Francisco, ruled that the company must face a major class action lawsuit, according to Reuters. Facebook has been trying to get the accusations dismissed ever since it was
Read more

How the Blockchain Is Helping Secure IoT Technology

For those reading this who were cognizant of such topics as the Internet of Things (IoT) and security architecture back in 2016, you may have had some passing knowledge of the Mirai botnet attacks that showed us all just how risky the present client-server model of IoT can be. At issue is the reality that … Read More The post How the Blockchain Is Helping Secure IoT Technology appeared first on The State of Security.
Read more

Smart Homes of Tomorrow – This is Not What We Expected

Most of my life has been centered around architecture and design. Both my grandfather and great grandfather were architects and during my childhood I spent a lot of time in and around their buildings. For me there is something to admire about architecture that goes beyond just the building itself. It wasn’t about being inspired The post Smart Homes of Tomorrow – This is Not What We Expected appeared first on Radware Blog.
Read more

Practical Attacks with DNS Rebinding

One of the tools I expect to see gain in popularity in the wild is DNS rebinding. DNS rebinding is a technique that turns a victim’s browser into a proxy for attacking private networks. Attackers can change the IP associated with a domain name after it has been used to load JavaScript. Since same-origin policy … Read More The post Practical Attacks with DNS Rebinding appeared first on The State of Security.
Read more

Edge Computing and the Future of IoT

As the Internet of Things (IoT) begins to take shape and its future becomes clearer, IT experts realize that mainstream cloud computing isn’t enough. It’s not fast enough to handle real-time data streaming applications, and it’s not efficient enough to meet evolving technological demands. But developers are exploring a possible solution in the form of… The post Edge Computing and the Future of IoT appeared first on CCSI.
Read more
Page 1 of 2012345...1020...Last »