Browsing Category
Cybersecurity
Tomas Foltyn — We Live Security
A critical flaw in Android’s Bluetooth has led users vulnerable to attack by hackers. The vulnerability affects users running Android Oreo (8.0 and 8.1) or Pie (9.0), which accounts for almost two-thirds of Android devices in use. In order for an attacker to!-->!-->!-->…
Read More...
The Australian wildfires were met with an outpour of support from across the world. There were legitimate fundraising efforts such as one by Australian comedian, Celeste Barber, who raised over 34 million dollars on Facebook to support firefighters. There were also scammers who found the disaster!-->…
Read More...
An academic study done at Princeton University found that “five major US prepaid wireless carriers are vulnerable to SIM swapping attacks.” SIM swaps occur when an attacker tricks the telco’s staff to switch someone’s phone number to the attacker’s SIM card, allowing the attacker to gain access to!-->…
Read More...
Following the hacking of the United States Federal Depository Library website with pro-Iranian messages, cybersecurity experts warn that the United States should prepare itself for cyberattacks. These attacks may entail major financial damage and disruptions to hospital and transportation systems.!-->…
Read More...
Smart TVs, televisions with internet streaming and facial recognition abilities, are commonplace in American households today. The FBI warns that these televisions are susceptible to intrusion, allowing hackers to potentially turn on cameras and microphones to stalk users. Smart TV owners should go!-->…
Read More...
Hypergiant, an Artificial Intelligence company, is building a new model that improves efficiency in search and rescue operations. This product uses geographic and aerial analysis to pinpoint the areas that are most impacted and where to focus their relief efforts on. Read more about the new!-->…
Read More...
San Francisco may become the first city in the United States to ban the use of facial recognition technology by police and city agencies. Supporters believe that the proposed legislation will be a step forward in protecting people’s civil rights and prevent an Orwellian future where people could!-->…
Read More...
A study done by the Information Systems Security Association and Enterprise Strategy Group claims that a majority of organizations are impacted by the cybersecurity skills shortage. The article also explained that 48 percent of study participants had experienced at least one cybersecurity!-->…
Read More...
News Staff — Government Technology
North Dakota legislature signed Senate Bill 2110, authorizing a new approach to cybersecurity in the state. With this new law, the state’s Information Technology Department now has the authority to define cybersecurity for everything in the state. Officials!-->!-->!-->…
Read More...
Since September 2018, the Los Angeles Department of Transportation has been collecting information about individual dockless vehicles such as scooters and electric bikes through a digital tool called MDS, or Mobility Data Specification. MDS information plays a pivotal role in shaping policy!-->…
Read More...
Su Chii-cherng, head of the Taiwan government office in Osaka, committed suicide in September after he was criticized in mainstream news reports for not having made arrangements to rescue Taiwanese tourists temporarily stranded at a typhoon-flooded Japanese airport.
As it turned out, the foreign!-->!-->!-->…
Read More...
Authorities are investigating a recent case of cyber-hack in the parliament.There are no shown evidence but the passwords of politicians are reset just by precautions. Read the full article by BBC news, click here.
Read More...
--CNN
Though the emergence of the Internet of Things (IoT) has allowed daily life to become effortless, critical security problems arise. Hackers are able to take control over the devices, resulting in a loss of personal information, money, or even life. Starting in 2020, California will require!-->!-->!-->…
Read More...
Due to recent intricate cyber attacks, China is commencing to introduce a new “unhackable” network. This tech is a quantum cryptography which uses light to send crucial informations where you start by embedding your message in particles of light. Read the full article byAndreas Illmer click here.
Read More...