Google Play icon
Does Antivirus Software Still Work?

August 13, 2019

Antivirus software protects your computer, laptop, or mobile phone from installing malware that can be used by hackers…
Secure Everything with Azure Sphere

July 22, 2019

In the era of IoT, life is increasingly more integrated with technology. The ability for everyday consumer gadgets,…
Same computer password for the last 10 years? You might need a vibrating cybernudge

May 17, 2019

Researchers say changing human behaviour key to foiling cyberattacks. Technology used in exercise and lifestyle apps may hold…
2019 Technology Trends That IT Managers Have To Follow

May 9, 2019

Every year, various industrial trends are forecasted, while everyone wait to see what comes out of the trend…
Organizing Access to Security Tokens Using USB over IP

April 19, 2019

I want to share my experience of finding a solution for organizing centralized access to security tokens (electronic…
Data Protection Software Market Is An Ever-growing Market With High Competition

October 9, 2018

With increasing data security risks, the need for data protection software has evolved. These softwares help in safeguarding…
The Dangers of Webcam Hacking: How to Prevent It and Stop It

October 9, 2018

Modern technology brings with it new threats to your privacy and security, and it’s important to learn what…
How to make an easy personal VPN setup with Google app for $5 a month

October 8, 2018

In the last few years, the use of VPN services has grown to be popular. But most guides…
Data Security — advice on some convenient ways to strengthen your passwords

October 5, 2018

The emergence of big data has taught us that information is an extremely valuable commodity. And, as with…
Remote Infrastructure Management – A Gist of Managed Services & Security

October 4, 2018

Hosting critical systems that require high-level maintenance in-house is one key aspect of the IT industry, which might…
4 Ways Technology Assists and Prevents Identity Theft

September 28, 2018

Identity theft has been on a continuous rise for the past several decades, and many times the increased…
£6m cyber security scheme launched to protect Greater Manchester’s companies against malicious computer attacks

September 5, 2018

Lancaster University experts are part of a £6 million cyber security scheme that will protect Greater Manchester’s business…
How mindfulness can help prevent hacks, and four more cybersecurity tips

September 4, 2018

You probably have a phishing email in your inbox right now. It might be an obvious scam, but…
Discovery casts dark shadow on computer security

August 24, 2018

Two international teams of security researchers have uncovered Foreshadow, a new variant of the hardware vulnerability Meltdown announced…
You’ve Been Phished!

June 28, 2018

Organizations worldwide stand to lose an estimated $9 billion in 2018 to employees clicking on phishing emails. We…
Why Hiring More Infosec Staff Doesn’t Mean Better Security

June 18, 2018

According to recent findings, getting more people on board a security team doesn’t make an organizations’ IT infrastructure…
Your Wi-Fi Can Be Hacked Due to WPA2 Protocol Vulnerability Called KRACK

February 15, 2018

The group of cybersecurity experts has recently found the greatest and unprecedented vulnerability in the security of Wi-Fi…
Internet-scanning startup offers new approach to cybersecurity

January 31, 2018

Rolling out what it’s calling a “street view for cyberspace,” Censys—a tech startup based on technology developed at…
5 Ways to Keep Your Computer Secure on This Computer Security Day

November 30, 2017

Nov. 30 marks Computer Security Day. It’s a time to make sure your computer is safe so that…
How to store information in your clothes invisibly, without electronics

November 3, 2017

A new type of smart fabric developed at the University of Washington could pave the way for jackets…
Berkeley Lab Aims to Strengthen the Cybersecurity of the Grid

October 11, 2017

As the U.S. electricity grid continues to modernize, it will mean things like better reliability and resilience, lower…
Cyber criminals are always one step ahead, but Blockchain tech might hold the promise for a fix

October 5, 2017

Cybersecurity is often a cat-and-mouse game. For antivirus and anti-malware developers, it is a constant hunt for vulnerabilities…
Guide to Securing Your Apartment’s Wi-Fi

October 5, 2017

Wi-Fi, the wonderful technology that lets us connect to that vast World Wide Web without also being connected…
USB ports are leaky – snooping is easy because of a common connection

August 14, 2017

Snooping is an illegal access to someone‘s data, stored in a computer. It does not have to be…
5 Simple Tips How to Manage Third Party Vendors from the Cyber Security Perspective

March 17, 2017

When it comes to cyber security, the threat from within the organization is just as big as the…
Astonishing number of people admit accessing Facebook accounts of their friends

January 31, 2017

Media is constantly telling us to be careful with our passwords and social media accounts. There are many…
3 Ways to Deal with Ransomware. Which One Would You Choose?

November 27, 2016

It’s not hard to imagine how serious the consequences of a ransomware attack could be. New anti-ransomware solutions are showing up almost every week.…
Cerber Ransomware, a True Cyber Predator

November 16, 2016

The crypto ransomware epidemic keeps taking individuals’ and organizations’ files hostage in pursuit of illegal profit. The mature…
People disregard security warnings on computers because they come at bad times

August 25, 2016

Software developers listen up: if you want people to pay attention to your security warnings on their computers…
Stanford Computer Scientists Show How Metadata Alone can Reveal Sensitive Personal Information

May 18, 2016

Telephone metadata – information about calls and text messages, such as time and length – isn’t something most…
Small USB Fingerprint Scanner

April 19, 2016

iTouch ID is a small USB fingerprint scanner, that is compatible with PC, Mac and Android platforms. It is…
New Digital Tracking Tool to Make Personal Online Data More Transparent

October 12, 2015

Thanks to corporate monitoring of our email transactions and browsing habits, navigating the Web is becoming more and…
Researchers Tackle Issues Surrounding Security Tools for Software Developers

August 25, 2015

For software programmers, security tools are analytic software that can scan or run their code to expose vulnerabilities…
Secure Keychain To Access All Devices

August 17, 2015

Passfort is a secure keychain which helps you manage all your accounts and  passwords. It works with all mobile devices…
Universal Fingerprint-Protected Autofill

August 11, 2015

Crypta is a fingerprint-protected USB device that allows you to log into your account on any computer with your fingerprint. Plug…
Integration of Virtual and Physical Security to Dominate Data Center Security Market Landscape

August 6, 2015

Data center security is a crucial part of any IT company’s operations. Owing to the high volume of…
Security Report Reveals 22 Percent Rise in Pirated Software and Digital Media Releases (Infographic)

July 31, 2015

Arxan Technologies, the leading provider of application protection solutions, announced the publication of its 4th annual ‘State Of…
Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices

July 24, 2015

The National Cybersecurity Center of Excellence (NCCoE) has released a draft for public comment of the first guide…
Computer security tools for journalists lacking in a post-Snowden world

July 23, 2015

Edward Snowden’s leak of classified documents to journalists around the world about massive government surveillance programs and threats to…
What is privacy and anonymity?

June 17, 2015

There are undoubtedly many advantages to living in a globally connected world and the information superhighway that we…
Fujitsu Develops Virtualization Technology that Brings Security and Operability to Web Applications

June 1, 2015

Fujitsu Laboratories Ltd. today announced that it has developed technology for web applications(1) that run on smart devices…
With one false tweet, computer-based Hack Crash led to real panic

May 22, 2015

A false tweet from a hacked account owned by the Associated Press (AP) in 2013 sent financial markets…
Expert in computer science drives computer-security spinoff

May 20, 2015

One illustrious career in computer sciences at the University of Wisconsin-Madison can be traced to an anxious mother,…
Self-powered intelligent keyboard could provide new layer of security

May 13, 2015

By analyzing such parameters as the force applied by key presses and the time interval between them, a…
Better debugger

March 24, 2015

Integer overflows are one of the most common bugs in computer programs — not only causing programs to…
Sophisticated cyber crime methods are changing the definition of hacking

March 1, 2015

More than 100 banks in 30 countries have joined the ranks of Anthem Blue Cross Blue Shield and…
Criminologist ‘hacks’ the hacker, explores meaning of hacking

February 18, 2015

We often view hackers as evil geniuses, but perhaps a more accurate depiction would be a talented —…
Smart keyboard cleans and powers itself — and can tell who you are

January 22, 2015

In a novel twist in cybersecurity, scientists have developed a self-cleaning, self-powered smart keyboard that can identify computer…
Login into any site by pointing a phone at the computer

January 15, 2015

Waltz is a plugint that allows anyone using Google’s Chrome Web browser on their desktop to log into any site,…
NIST Issues New Revision of Guide to Assessing Information Security Safeguards

December 17, 2014

The National Institute of Standards and Technology (NIST) has released the final version of the 2014 update to…
1 - 100 | 101 - 153 | Next page »
Technology Org App
Google Play icon
87,522 science & technology articles

Most Popular Articles

  1. An 18 carat gold nugget made of plastic (January 13, 2020)
  2. Anti Solar Cells: A Photovoltaic Cell That Works at Night (February 3, 2020)
  3. Toyota Raize is a new cool compact SUV that we will not see in this part of the world (November 24, 2019)
  4. Nuclear waste could be recycled for diamond battery power (January 21, 2020)
  5. Physicist Proposes a Testable Theory Stating that Information has Mass and could Account for Universe s Dark Matter (January 24, 2020)

Follow us

Facebook   Twitter   Pinterest   Tumblr   RSS   Newsletter via Email