Google Play icon
How to Make Your SDLC Secure

Yesterday

The Software Development Lifecycle (SDLC) encompasses several stages that take software from an idea in the heads of…
Biggest Cyber Attacks and Their Cost for the Global Economy

Yesterday

In 2017, cybercrime cost the global economy $600 billion. In 2018, the global financial damage exceeded $1 trillion,…
Personalized medicine software vulnerability uncovered by Sandia researchers

July 10, 2019

Discovery led researchers to software fix.  A weakness in one common open source software for genomic analysis left…
Protecting Yourself (And your Credit Score) from Identity Theft Online

July 9, 2019

No matter how much you know about technology or the amount of time you’ve spent on the Internet,…
What Is a Security Operations Center and Why You Need it

July 7, 2019

Cyber attacks continue to hit organizations of all sizes and cause problems ranging from costly system downtime to…
Keeping children safe in the ‘Internet of Things’ age

June 25, 2019

Children need protection when using programmable Internet computing devices – and Lancaster University scientists have drawn up new…
How AI is Transforming Cybersecurity

June 20, 2019

Technological advancements have led to the rapid integration of artificial intelligence (AI) into business operations. It’s estimated that…
How mobile apps can prevent security breaches? (Infographic)

June 18, 2019

Mobile devices have become increasingly attractive targets for hackers looking to exploit the sensitive personal information they store.…
The Technology Behind Car Hacking (Infographic)

June 10, 2019

As technology advances, companies start to implement innovative features in their products. One product that many consumers see…
Top Software Development Trends for the Future

May 24, 2019

There are significant changes underway when it comes to software development.  Seven key trends are emerging that are…
Free techniques to protect your business against ransomware

May 20, 2019

The ransomware plague continues to be a major concern for organizations around the world. These predatory programs leverage…
Same computer password for the last 10 years? You might need a vibrating cybernudge

May 17, 2019

Researchers say changing human behaviour key to foiling cyberattacks. Technology used in exercise and lifestyle apps may hold…
Data Loss Prevention (DLP): What Startups and SMEs Must Know?

May 16, 2019

Data Loss Prevention, also known as Data Leak Prevention, is one of the most crucial policies for an…
What Your Small Business Can Learn From Hundred Of Fortune 500 Hacks

May 14, 2019

It sometimes seems that every time you check the news, you read about yet another company that has…
Vulnerability Assessment and Penetration Test – What’s the Variation?

April 25, 2019

As the attackers are increasing day by day, the threats of hacking are also increasing with it. Processes…
These 5 Cyber Threats Are on the Rise in 2019

April 5, 2019

2018 was a good year for hackers. Hundreds of millions of records were breached following cyber attacks. A…
Website Setup: How To Make It Safe From Hackers

April 3, 2019

A website plays a significant role in the success and growth of a business. When you have a…
Dark Web – Why Organizations Find it Useful?

March 31, 2019

Why cybersecurity businesses tend to access a marketplace of the illegal process? In search of important data or…
The Impact of AI on Cybersecurity

March 19, 2019

Cybersecurity experts and cybercriminals alike are using artificial intelligence (AI) and machine-learning tools to protect and steal data…
Your body is your internet – and now it can’t be hacked

March 13, 2019

Researchers have protected your pacemaker, other medical tech from remote hacks before they happen. Someone could hack into…
Hacking Internet of Medical Things (IoMT) Devices: What To Know

March 5, 2019

Modern technology has provided several innovations that has greatly improved an individual’s personal and professional lives. Across several…
You want a smart or secure home? Scientists say that it is difficult to have both

March 1, 2019

Everything has to be smart nowadays – smart phones, smart TV’s, smart fridges, smart toilets – everything. And…
Scientists eavesdrop on DNA synthesizer to steal genetic blueprint

February 28, 2019

Research shows vulnerability of sensitive procedure to acoustic side-channel attack. During the DNA synthesis process in a laboratory,…
Cybersecurity Threats Small Firms Shouldn’t Ignore in 2019

February 25, 2019

Cyberattack prevention is not just a buzzword, at least in today’s era. The term is surfacing the Internet…
Study finds parents unsure how to handle cyberbullying

February 21, 2019

Parents know they need to work with their child’s school to prevent cyberbullying, but a new study from…
How to Stop Hackers from Invading Your Network: 9 Steps

February 18, 2019

If you’ve recently purchased a smart TV, a smart fridge, a smart washer and dryer, a smart garage…
ORNL teams with Los Alamos, EPB to demonstrate next-generation grid security tech

February 13, 2019

A team of researchers from the Department of Energy’s Oak Ridge and Los Alamos National Laboratories has partnered…
Defending against cyberattacks by giving attackers ‘false hope’

February 1, 2019

With almost every online purchase, a person’s personal information — name, date of birth and credit card number…
Cybersecurity: The Importance of Securing Personal Information

January 26, 2019

Technology has come a long way. The advancement of technology has paved the way for much more development…
5 Myths About Data Breaches

January 26, 2019

Not sure what’s fact and what’s fiction when it comes to data breaches? Check out the top five…
Technology Org App
Google Play icon
82,517 science & technology articles