Researchers Develop App to Protect PINs and Passwords Against Shoulder-Surfing

No one likes a stranger standing close to them. And at least one of the reasons for that is to avoid “shoulder-surfing,” or the event when a stranger is looking over your shoulder to your phone or ATM to observe a financial transaction and catch a glimpse of your PIN or account number. But the …

AI Cyber Attacks: Coming Soon

As if regular hackers weren’t enough, soon we’ll have to deal with artificially intelligent (AI) cyber attacks too. And according to experts, the first AI-powered cyber attack could come very soon indeed: in the next 12 months.At a recent cybersecurity conference, out of 100 industry professionals, 62 said that we could expect AI cyber attacks …

Beware of These Financial Scams

Hackers and fraudsters can be hard to avoid even if you’re doing everything right. Stealing your money or your identity or your private information are just some of the things these fraudsters and hackers do, so being super-careful while on the internet is a must.However, even being super-careful can sometimes be not enough. This is …

How Secure Are Our Messages Really?

A new study conducted by Brigham Young University (BYU) researchers has revealed that most users of popular messaging apps such as Viber and WhatsApp are making themselves exposed to hacking and fraud. How? By not using important security options.The researchers wanted to understand how typical users use messaging apps and how they’re protecting themselves while …

Research Shows Hacking Is On The Rise: Six Billion Records Hacked Just This Year

New research has shown that a surge in computer hacking has led to an incredible breach of security – more than six billion records were hacked so far this year. Bear in mind that we’re still nowhere near the end of 2017, and this number has already topped the total for 2016.Risk Based Security in …

Hacker Summit Discusses How to Prevent Major Attacks

The Black hat conference, a computer security conference, has recently had its summit, where Facebook chief security officer Alex Stamos (among others) spoke. Stamos explained that the focus now needs to be on preventing brazen attacks. Here’s how.Stamos’ idea is quite original: hackers that were once known for small, relatively harmless mischief should now reach …

IBM to Create a System for Secure Cryptographic Keys and Data Protection

BM has announced that the company has been granted a patent on a system that will use the inherent structure of a PCB (printed circuit board) to protect codes and cryptographic keys in a manner that is designed to be highly secure and tamper-resistant.IBM’s patented system won’t require extensive use of materials such as resin, …

Satellite-Based Quantum Encryption Network

Today, our text messages, as well as our health information and bank transactions are based on mathematical algorithms encryption. Although highly efficient, this approach will be hard to keep safe once the quantum computer hit the scene. This is because, unlike regular computers, super-powerful computers can figure out the exact algorithm used to encrypt data.An …

Using Brainwaves to Steal Passwords

According to researchers at the University of Alabama at Birmingham, hackers could use your brainwaves to steal your passwords. This is thanks to increasingly popular technology brainwave-sensing headsets, also known as EEG headsets.EEG headsets allow users to use only their thoughts to control various robotic toys and video games. Although there are only a handful …

Canada’s Top Court Orders Google to Remove a Website from Search Results

For the first time ever, Google has been ordered to remove a website from its global search results. If you’re worried about censorship, freedom of expression and rights to access information, read on to find out what exactly happened.On Wednesday, the Top court in Canada ordered Google to remove a website from its global search …

Design a site like this with WordPress.com
Get started