How to Protect Yourself from Camera and Microphone Hacking

There have long since been rumors of possible camera and microphone hacking opportunities on Apple devices, leading Apple to disable the Walkie Talkie audio chat feature in Apple – a vulnerability in apple’s system. The video and audio chatting app Zoom also experienced a flaw in its system where users who deleted the app could …

Bulgaria Detains Cybersecurity Employee Tax Data Hacking

A 20-year-old Bulgarian employee of a cybersecurity company has been detained as a suspect who is allegedly behind the hacking of the national revenue agency, an attack that impacted 5 million out of the 7 million population in Bulgaria through the leakage of both personal and corporate data. Prime Minister Boyko Borissov later revealed that …

Microsoft has Warned 10,000 Victims of State-sponsored Hacking

Microsoft has revealed that there have been 10,000 victims, mostly enterprise customers, that were either targeted or compromised by hackers working for a foreign government. This incident demonstrates the significant extent to which nation-states continue to rely on cyberattacks as a method for gaining information, insight, etc. So far, there have been 781 notifications through …

Hackers are Stealing Years of Call Records from Hacked Cell Networks

Boston-based company Cybereason discovered a breach in multiple phone provider networks, which was carried out by an unknown group of hackers who have been conducting targeted surveillance on individuals on interest for seven years, having hacked ten call networks globally in order to obtain massive amounts of call records – time, date, and location – …

The Gender Gap in Computer Science Research Won’t Close for 100 Years

The gender gap in many fields is becoming very evident and is a growing issue in addition to the growing pressure to address gender inequality. There are low numbers of women in the scientific fields, especially in computer science where the low numbers are a result of the biases of males who are managing conferences …

Better Cybersecurity Even in Harsh Environments

Keeping personal and sensitive data safe and secure is of crucial importance. Unfortunately, many – if not most – people don’t realize this until it’s too late. But when it comes to data protection, the ones who need to worry about it the most are military personnel – not only could the military lose enormous …

Keeping Data Private With AI

Artificial intelligence (AI) usually takes advantage of machine learning, a field of computer science that enables computers to think and learn similarly to humans – based on examples, without programming. So what if we combined the power of AI with data safety? A team of researchers at the University of Helsinki, Finland, has recently done …

Fooling Speaking Recognition Systems Is Not as Hard as It Sounds

Applications that function with voice commands are becoming increasingly popular. Nowadays, pretty much every new smartphone has at least one application that functions using audio signals – users dictate messages, translate words and phrases, do search queries and many other things using only their voice, which explains their popularity. However, although they may appear quite …

Coming Soon: The Ultimate, Atomically Thin Defense Against Hackers

Researchers at New York University Tandon School of Engineering have developed a new technology that could become the next generation of electronic hardware security. The new tech is a novel class of unclonable cybersecurity primitives made of nanomaterial that possesses the highest ability of structural randomness.The new technology represents the first proof of complete spatial …

New Study Shows Websites Track User Activity, Ignoring Privacy Settings

It’s no secret that many websites monitor user activity, their browsing history, and their preferences. This is done so that companies can target their audience and create tailored advertisements. But did you know that some websites also track a user’s mouse movements and their input into a web form even before it’s submitted? According to …

Design a site like this with WordPress.com
Get started