How to protect your system against fraudulent emails?

Through the rise in digital engagement globally, email is dominating both enterprise and consumer communication. However, email, despite its importance, ubiquity, and staying power,...

Cybersecurity’s Next Frontier: 80+ Companies Using Artificial Intelligence To Secure The Future

Cybersecurity companies saw a record number of funding deals last year and on a quarterly basis Q1’17 was the most active quarter for deals to private cybersecurity...

Most Indian firms vulnerable to cyber attacks than ever before; 60% of companies still...

When it comes to cyber security, 91 per cent of businesses in India say their organisation is at risk because of the complexity of...
connected car

Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems

The team considered a prototypical intelligent transportation system with a control law that is specifically designed to avoid collisions. They then experimentally demonstrate that, nevertheless, an...
online-fraud-hacking

Dynamic Watermarking: Active Defense of Networked Cyber-Physical Systems

The coming decades may see the large scale deployment of networked cyber-physical systems to address global needs in areas such as energy, water, healthcare,...
vehicle-hacking

What if your self driving car gets hacked? Texas A&M researchers tackle autonomous vehicle...

Texas A&M University researchers have developed an intelligent transportation system prototype designed to avoid collisions and prevent hacking of autonomous vehicles. Modern vehicles are...
Mobile Enterprise Security

Worldwide Mobile Enterprise Security Software Forecast, 2016–2020

The worldwide mobile enterprise security software market spans across six market segments: mobile threat management (MTM), mobile information protection and control (MIPC), mobile gateway and...
business email scam

5 scenarios used by hackers according to the FBI to scam, defraud, steal funds...

Hackers will these following for data theft, attorney impersonation, Business E-mail Compromise (BEC) is defined as a sophisticated scam targeting businesses working with foreign suppliers...
biometrics

The 12 Hottest Biometric Companies That Are Changing The Game

With increasingly more sensitive and personal information being stored on devices nowadays, biometric technology has become more and more important for security, and to...
Internet Security System

10 innovative cybersecurity firms

The Cybersecurity industry is growing from $75 Billion in 2015 to $170+ Billion in 2020, according to consolidated estimates by IT research firms and...

Stay connected

0FansLike
2FollowersFollow

Latest articles

Artificial Intelligence Meets Healthcare

Posted onThe availability of vast amounts of health care data is driving the development of artificial intelligence (AI) applications. It promise to improve the efficiency...

Top 4 Ways Augmented Reality Could Change Corporate Training Forever

By 2020, 25% of the American workforce will be over the age of 55 and approaching retirement, a phenomenon becoming known as the Silver...

Malicious Hackers are targeting hotel Wi-Fi with particularly evil malware

Just because your hotel offers complimentary Wi-Fi, it doesn’t mean you have to take it. Hackers may be lurking, looking to compromise your computer,...

Commercial Augmented Reality Is Where Vuzix Should Reward Shareholders

Summary Commercial use augmented reality technology is set to expand from fringe to mainstream over the next five years. Vuzix is well positioned to take advantage of...

Security Experts Warn Congress That the Internet of Things Could Kill People

growing mass of poorly secured devices on the Internet of things represents a serious risk to life and property, and the government must intervene...