Cybersecurity researchers build a better 'canary trap'
“The system produces documents that are sufficiently similar to the original to be plausible, but sufficiently different to be incorrect,” said V.S. Subrahmanian, the Distinguished Professor in Cybersecurity, Technology, and Society, and director of the Institute for Security, Technology, and Society.
iOS 14.5: How This Could Be Apple’s Most Stunning iPhone Update Yet
Apple’s iOS 14.5 is set to launch very soon, with a bunch of really cool new features for your iPhone. As new iOS 14.5 features continue to be revealed via the beta release, it looks likely that this could be Apple’s most stunning iOS 14 update yet for those who care about security and privacy.
Don’t Lose Your WhatsApp For 7 Days - Change This Critical Setting Now
If you’re one of WhatsApp’s 2 billion users, you’re likely concerned about recent headlines warning that your data is being harvested and shared with Facebook. But there’s a much more serious risk for you to worry about—one which is getting worse. Here’s what you must do to ensure you don’t lose your account for at least 7 days.
Future Focused: The 2021 Cybersecurity Landscape
2020 was a year of challenges. The onset of Covid-19 necessitated a work-from-home environment on an unprecedented scale.
Bolstering Risk And Cybersecurity Strategy Safeguards The Remote Workforce
When Covid-19 prompted lockdowns around the world last year, most businesses made the impromptu decision to safeguard employees and allow them to work from home (WFH). Most companies acted efficiently in making this abrupt transition to a new remote working model led by WFH.
Cybersecurity: Same Threats, New Challenges
For business leaders, 2020 was many things. A test. A catalyst. An opportunity.
For chief information security officers (CISOs), it was all of these things at once—with the security of the business hanging in the balance. This was especially true when it came to the rapid shift to remote work.
WhatsApp Soundly Beaten By Apple’s Stunning New iMessage Update
WhatsApp, the world’s leading messenger with 2 billion users sending 100 billion messages each day, popularized secure messaging. But if you’re one of the hundreds of millions using WhatsApp on an iPhone, you’re in for an unwelcome surprise when you see Apple’s stunning new iMessage update.
The Top 20 Cybersecurity Startups To Watch In 2021 Based On Crunchbase
Today, 797 cybersecurity, privacy and security startups have received a total of $10.73 billion so far this year, with $4.6 million being the median funding round and $17.5 million the average funding round for a startup.
Revealed: How The EU Funds Global iPhone And Facebook Surveillance
Police across the world are getting special training from a little-known European Union agency on how best to snoop on Facebook and Apple iPhones, according to documents obtained by nonprofit Privacy International.
All Tricks And No Treat: Preparing For IT Chaos In 2021
The tech industry is filled with shock statements about the unexpected sea of spooky threats just around the corner and how to prepare for them. But disaster recovery, backup, and resiliency are not the glitziest subjects when times are stable.
Development of anti-phishing browser based on random forest and rule of extraction framework
Phishing is a technique under Social Engineering attacks which is most widely used to get user sensitive information, such as login credentials and credit and debit card information, etc. It is carried out by a person masquerading as an authentic individual.
Is Your Boardroom The Weakest Cybersecurity Link?
From phishing to ransomware, one of the primary challenges with effective cybersecurity risk management is related to the weakest link theory. The essence of this theory is the phrase “a chain is no stronger than its weakest link.” This idiom reflects the fact that effective cybersecurity risk management is a complex system of related and inter-dependent parts. If one component fails, it can jeopardize the entire system.
China tightens tech export controls potentially jeopardizing TikTok deal, reports say
According to the reports, China updated its export control rules to incorporate technology that could include TikTok, a claim later reasserted by commentary published in China’s state-controlled Xinhua news agency on Saturday.
What’s New In Gartner’s Hype Cycle For Endpoint Security, 2020
These and many other new insights are from Gartner Hype Cycle for Endpoint Security, 2020 published earlier this year and the recent announcement, Gartner Says Bring Your Own PC Security Will Transform Businesses within the Next Five Years. Gartner’s definition of Hype Cycles includes five phases of a technology’s lifecycle and is explained here.
India needs tools, technology and experts to protect cybersecurity assets: Tech Mahindra
India needs an army of cybersecurity experts, tools and technology to protect its assets against malicious attackers as data becomes a pervasive “lifeline” for countries, says C. P. Gurnani, CEO and managing director of Tech Mahindra.