For years, IoT developers have focused too much on availability, and not enough on privacy and confidentiality. This mindset appears to be shifting and the NIST report is proof of a growing recognition that there needs to be universal standards in place to improve the privacy and security of any IoT system.
Individuals, business leaders, and all other types of organization leaders need to improve their ransomware protections to protect their personal data, preserve privacy, and maintain access to their other data. What are some of the simple steps to avoid being a ransomware victim?
There is reason to be optimistic about the future of cyber security. In today’s world, there is always a “weak link” in the chain that hackers can exploit. In a blockchain world, there are no longer any weak links and every action taken on the blockchain is part of a completely verifiable and trackable digital ledger.
There's a need to secure offline, rather than online, microfinancing solutions. The future rests in the power of embeddable microchips and the power of process isolation by inserting a Linux-powered computer into the architecture of an non-secure IoT device to create a hardware Root of Trust.
ATM machines have always represented a “soft target” in the minds of criminals. What’s now clear is that the ATM card skimmer scams of years past pale in comparison with what’s possible now with jackpotting scams with cyber criminals turning every ATM they visit into casino slot machines with huge jackpots.
Cybersecurity and AI has dominated the recently concluded WEF at Davos. Yet, there is still a lot more to be done in terms of close and constant cooperation between the pioneering private organizations and the forward thinking governments. Simple right? Easier said than done.
EFF and Lookout traced Dark Caracal to Lebanon and has infected Android users in more than 20 countries and stolen hundreds of gigabbytes of dat. Cyber espionage using fake apps with Android malware is the new trend as nation states and cybercriminals move towards using mobile as the target platform.
There is a tremendous amount of potential for machine learning and cyber security within the enterprise. In order for machine learning to live up to the hype, it will need to offer a fully robust security solution and plenty of organizations are now betting that machines will be up to the task.
The Unique Identification Authority of India (UIDAI) has denied reports that the Aadhaar data breach has made masses of biometric data available to external players for a miniscule sum. Has big government in India simply overreached itself as far as its vision for this database is concerned?
Are you a victim of cryptojacking? Both individuals and organizations are now at risk of this new hacking approach to tap into your computer’s processing power. Most famously, Coinhive has been promoting this controversial new practice to tap for mining the cryptocurrency Monero.