Theoretical computer science provides answers to data privacy problem
The promise of big data lies in researchers’ ability to mine massive datasets for insights that can save lives, improve services and inform our understanding of the …
Week in review: The price of the Internet of Things, YiSpecter hits non-jailbroken iOS devices, and the most secure Android smartphones
Here’s an overview of some of last week’s most interesting news and articles:The price of the Internet of Things will be a vague dread of a malicious …
LogMeIn to acquire LastPass for $125 million
LogMeIn has agreed to acquire LastPass, the popular single-sign-on (SSO) and password management service.Under the terms of the transaction, LogMeIn will pay $110 million in …
Apple boots some ad blockers from App Store to protect users’ privacy
Less than a month has passed since the release of iOS 9, with which Apple welcomed third-party ad blocking apps, and the company has removed some of them from the App …
Which Android smartphones are most secure?
87% of Android devices are vulnerable to attack by malicious apps and messages, a group of researchers from Cambridge University in England has revealed.For years now, they …
Attackers compromise Cisco Web VPNs to steal login credentials, backdoor target networks
Another Cisco product is being targeted by attackers looking for a permanent way into the computer networks and systems of various organizations, Volexity researchers …
Most are concerned about security of healthcare data
More than three-fourths (76 percent) of U.S. adults are concerned that their healthcare records are vulnerable to hackers, according to the University of Phoenix.Perhaps not …
Top strategic IT predictions for 2016 and beyond
Gartner’s top predictions for 2016 look at the digital future, at an algorithmic and smart machine-driven world where people and machines must define harmonious …
CIOs agree, IT is more complex than ever
Nine out of ten UK CIOs (93%) believe that IT complexity has increased, according to Trustmarque. The research has revealed that cloud computing (66%), legacy technology (51%) …
New Toshiba CMOS image sensor improves recognition and authentication
In recent years, mobile devices have adopted user authentication systems to protect access and information security. Password entry remains the most common, but finger print …
Fake Android apps bypass Google Play store security
“ESET unveiled fake apps available at the official Google app store. Posing as popular game cheats, such as Cheats for Pou, Guide for SubWay and Cheats for SubWay, these …
Former journalist faces 25 years in prison for article defacement
Matthew Keys, a former Reuters social media editor, has been found guilty of computer hacking, and could be sentenced to spend as many as 25 years in prison.Keys was indicted …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days