Google Play icon
Do You Use Free VPNs? Be Sure to Read This

Today

In the eyes of many people, VPNs are services that allow you to visit sites that are blocked…
Deepfakes: The fight against the dangerous use of AI

February 5, 2020

Deepfakes are known as manipulated videos in which a person is changed or displayed as someone else by…
Quantum experiments explore power of light for communications, computing

January 24, 2020

A team from the Department of Energy’s Oak Ridge National Laboratory has conducted a series of experiments to…
2020 Guide: How to prevent ransomware attacks

December 24, 2019

Organisations are the most popular target to cyberthreats and especially to ransomware. When ransomware infects a computer, it…
DevSecOps: Security Management in 2020

November 29, 2019

As the number of security breaches in 2019 continues to grow, organizations are looking for better ways to…
Cyberattacks on IoT Devices Grow 300% in 2019: How to Secure Yourself?

November 19, 2019

300 percent. That’s how much cyberattacks on IoT devices have increased in 2019. These machines aren’t the most…
Design flaw could open Bluetooth devices to hacking

November 18, 2019

New research shows the way devices “talk” to apps leaves them vulnerable. Mobile apps that work with Bluetooth…
After a great success on Indiegogo, Turris MOX modular router with unique protection is now coming on the market

November 4, 2019

Allowing users to choose parts according to their needs and flexibly responding to current network threats, the router…
Computer Science Professor Brings the Skills of a Detective to Combat Cyber Attacks

October 28, 2019

Sherlock Holmes, Miss Marple, Sam Spade, Columbo, Yonghwi Kwon, Magnum PI, Veronica Mars … If you can pick…
Global Ransomware Attacks Decrease, but Those Carried out Are Bolder Than Ever

October 23, 2019

European police and the private sector have released statements indicating that there are now fewer cyberattacks directed at…
How and why medical facilities are targeted by hackers

October 23, 2019

One of the most worrying recent cybersecurity statistics is the prevalence of attacks conducted against medical facilities. According…
Sandia National Laboratories’ Drew Woodbury works on a flat-sat assembly designed to prove software and cyber defense algorithms work before deploying them on orbiting satellites. (Photo by Meagan Brace/Sandia)
Armoring satellites to survive and operate through attacks

October 23, 2019

Sandia launches campaign to develop autonomous satellite protection systems. Satellites do a lot of things — they help…
Protecting smart machines from smart attacks

October 15, 2019

Machines’ ability to learn by processing data gleaned from sensors underlies automated vehicles, medical devices and a host…
Everything You Must Know About ATM Skimming

October 11, 2019

Recently in Perth, bank users are  being warned regarding various suspicious devices at ATMs after a man was…
Why does the new Google password checkup matter?

October 7, 2019

Over the course of recent years, password authentication has been at the forefront of several cybersecurity debates and…
Algorithms could stop an ‘internet of things’ attack from bringing down the power grid

September 26, 2019

Last year, Princeton researchers identified a disturbing security flaw in which hackers could someday exploit internet-connected appliances to…
6 Web Security Practices to Protect Against Modern-Day Cyber Threats

September 18, 2019

According to the FBI’s “2018 Internet Crime Report”, cyber threats were responsible for a staggering $2.5 billion in…
Don’t Become Another Trophy on a Cybercriminal’s Wall (Infographic)

September 17, 2019

Capital One, Facebook, Epsilon, Yahoo, Experian. Aside from the fact that these are all big players in their…
Report reveals growing threat of cyberattacks to food safety

September 11, 2019

A new report by University of Minnesota researchers indicates cyberattacks pose a rising threat to food production and…
Website Rates Security of Internet-Connected Devices

September 5, 2019

If you’re in the market for an internet-connected garage door opener, doorbell, thermostat, security camera, yard irrigation system,…
Cybercrime Costs the Global Economy $2.9M a Minute

August 30, 2019

In 2017, cybercrime cost the global economy a whopping $600 billion due to the likes of WannaCry and…
Can you keep a secret?

August 28, 2019

Researchers everywhere race to create systems for secure communication with the power of quantum physics. These ideas describe…
AI Fraud Detection Investments to Triple by 2021

August 22, 2019

Artificial intelligence (AI) has many compelling business use cases. Two of the rapidly emerging reasons why businesses use…
Google Now Offers Password-Free Log-In for Android Users

August 22, 2019

If you’re like most people, creating and typing in different passwords for all the user accounts you’ve got…
Does Antivirus Software Still Work?

August 13, 2019

Antivirus software protects your computer, laptop, or mobile phone from installing malware that can be used by hackers…
Smartphone Apps May Connect to Vulnerable Backend Cloud Servers

August 13, 2019

Cybersecurity researchers have discovered vulnerabilities in the backend systems that feed content and advertising to smartphone applications through…
TAU and Technion Researchers Wrest Control of One of World’s Most Secure PLCs

August 12, 2019

Cybersecurity researchers at Tel Aviv University and the Technion Institute of Technology have discovered critical vulnerabilities in the Siemens S7…
How Virus Creators Get Caught

August 11, 2019

Some people believe in UFOs and poltergeists, someone in a bigfoot, and some people think that a developer…
Hackers Could Use Connected Cars to Gridlock Whole Cities

August 1, 2019

In the year 2026, at rush hour, your self-driving car abruptly shuts down right where it blocks traffic.…
The State of The Ransomware Problem

July 23, 2019

Earlier this year, Baltimore, Maryland residents couldn’t pay their municipal bills or make transactions when a ransomware attack…
Secure Everything with Azure Sphere

July 22, 2019

In the era of IoT, life is increasingly more integrated with technology. The ability for everyday consumer gadgets,…
How to Make Your SDLC Secure

July 18, 2019

The Software Development Lifecycle (SDLC) encompasses several stages that take software from an idea in the heads of…
Biggest Cyber Attacks and Their Cost for the Global Economy

July 17, 2019

In 2017, cybercrime cost the global economy $600 billion. In 2018, the global financial damage exceeded $1 trillion,…
Personalized medicine software vulnerability uncovered by Sandia researchers

July 10, 2019

Discovery led researchers to software fix.  A weakness in one common open source software for genomic analysis left…
Protecting Yourself (And your Credit Score) from Identity Theft Online

July 9, 2019

No matter how much you know about technology or the amount of time you’ve spent on the Internet,…
What Is a Security Operations Center and Why You Need it

July 7, 2019

Cyber attacks continue to hit organizations of all sizes and cause problems ranging from costly system downtime to…
Keeping children safe in the ‘Internet of Things’ age

June 25, 2019

Children need protection when using programmable Internet computing devices – and Lancaster University scientists have drawn up new…
How AI is Transforming Cybersecurity

June 20, 2019

Technological advancements have led to the rapid integration of artificial intelligence (AI) into business operations. It’s estimated that…
How mobile apps can prevent security breaches? (Infographic)

June 18, 2019

Mobile devices have become increasingly attractive targets for hackers looking to exploit the sensitive personal information they store.…
The Technology Behind Car Hacking (Infographic)

June 10, 2019

As technology advances, companies start to implement innovative features in their products. One product that many consumers see…
Top Software Development Trends for the Future

May 24, 2019

There are significant changes underway when it comes to software development.  Seven key trends are emerging that are…
Free techniques to protect your business against ransomware

May 20, 2019

The ransomware plague continues to be a major concern for organizations around the world. These predatory programs leverage…
Same computer password for the last 10 years? You might need a vibrating cybernudge

May 17, 2019

Researchers say changing human behaviour key to foiling cyberattacks. Technology used in exercise and lifestyle apps may hold…
Data Loss Prevention (DLP): What Startups and SMEs Must Know?

May 16, 2019

Data Loss Prevention, also known as Data Leak Prevention, is one of the most crucial policies for an…
What Your Small Business Can Learn From Hundred Of Fortune 500 Hacks

May 14, 2019

It sometimes seems that every time you check the news, you read about yet another company that has…
Vulnerability Assessment and Penetration Test – What’s the Variation?

April 25, 2019

As the attackers are increasing day by day, the threats of hacking are also increasing with it. Processes…
These 5 Cyber Threats Are on the Rise in 2019

April 5, 2019

2018 was a good year for hackers. Hundreds of millions of records were breached following cyber attacks. A…
Website Setup: How To Make It Safe From Hackers

April 3, 2019

A website plays a significant role in the success and growth of a business. When you have a…
Building Trust in Blockchain for the Electric Grid

April 1, 2019

PNNL pilots two use cases applying blockchain technology to improve the cybersecurity of critical electricity infrastructure. In the…
Dark Web – Why Organizations Find it Useful?

March 31, 2019

Why cybersecurity businesses tend to access a marketplace of the illegal process? In search of important data or…
Technology Org App
Google Play icon
87,551 science & technology articles

Most Popular Articles

  1. An 18 carat gold nugget made of plastic (January 13, 2020)
  2. Anti Solar Cells: A Photovoltaic Cell That Works at Night (February 3, 2020)
  3. Toyota Raize is a new cool compact SUV that we will not see in this part of the world (November 24, 2019)
  4. Nuclear waste could be recycled for diamond battery power (January 21, 2020)
  5. Physicist Proposes a Testable Theory Stating that Information has Mass and could Account for Universe s Dark Matter (January 24, 2020)

Follow us

Facebook   Twitter   Pinterest   Tumblr   RSS   Newsletter via Email