Hackers are exploiting vulnerabilities to steal crypto currency. In a recent attack, they stole over 153,000 Ether, which approximately translates to over $30 million dollars. A considerable amount, it is….
Read MoreHackers are exploiting vulnerabilities to steal crypto currency. In a recent attack, they stole over 153,000 Ether, which approximately translates to over $30 million dollars. A considerable amount, it is….
Read MoreEducate teenagers about the ill-effects of drugs and chances are they might refrain from doing them. On the other hand, ‘order them’ not to do drugs, and chances are they…
Read MoreThe Internet of things (IoT) is getting physical devices, vehicles and other smart devices, and even buildings, embedded with software, electronics, sensors, and network connectivity. The Internet of Things is…
Read MoreReports are that Symantec, one of the leaders in the international market for SSL certificates, in a recent move, is thinking of selling its web certificate business, so as to…
Read MoreA survey of top cyber security professionals reveals that they fear a massive cyberattack on U.S. critical infrastructure. And many believe that this massive attack is not far away. They…
Read MoreThe data breach at the United States Office of Personnel Management (OPM) in 2015 was a wakeup call for the U.S. Government. It was just what many government officials had…
Read MoreApple Inc. will soon be storing cloud data of its Chinese customers with a Chinese government-owned company in accordance with the latest cyber security laws of China. The southern province…
Read MoreSupport for Artificial Intelligence (AI) is growing in many fields, and cyber security is no different. Prompted by this trend, NVIDIA has invested in Deep Instinct, an Israeli startup focused…
Read MoreBrain chips are being developed. Brain-computer interfaces (BCIs) or brain-machine interfaces (BMIs) that can connect the human mind to computers are being developed and significant progress has been made. Actually,…
Read MoreCyber awareness has to be implemented to enhance cyber hygiene. Users have become accustomed to spending lots of time online, but are not generally aware of the size and scope…
Read More