Browsing Category
Cyber Security
Metasurface Creates Three Images Based on Illumination
Researchers created a metasurface device that can display three types of images depending on illumination. They…
You Are Worth $1,010 on the Dark Web
Privacy Affairs released Dark Web Price Index 2022, taken from data scanning dark web marketplaces, forums, and…
Data Breach Announcements Timed to Bury the Bad News
New research in the INFORMS journal Management Science shows that companies that have had data breaches…
NIST Standards Include Kyber, Dilithium, and SPHINCS+ for Post-Quantum…
The American National Institute of Standards and Technology (NIST) has selected security algorithms CRYSTALS-KYBER,…
Radio Waves Detect Hardware Tampering
Tampering with hardware used to read out information is a huge security risk. Researchers in Bochum developed a…
Recovering From Ransomware Attack—Ah, Did You Forget Something?
Apricorn announced new findings from the Apricorn 2022 Global IT Security Survey. Front and center in these…
Poor Website Encryption When Accessed Using iOS Devices
Mobile threat defense provider, Corrata, announced it discovered poor encryption practices on several prominent…
Google to Buy Mandiant
Google LLC penned a definitive agreement to purchase Mandiant, Inc. The addition of Mandiant will enhance Google…
Industrial Control System Vulnerability up 110% Over 4 Years
The fourth Biannual ICS Risk & Vulnerability Report from Claroty's Team82 has frightening findings, including:…
Security Breaches Mostly Happen on Fridays
According to SecurityScorecard’s new data report, "The CISO's Playbook: Stay Ahead of Friday Breach Effects" expect…