Phishing: Why It’s So Common, and Why It Works So Well
You might be aware of cybersecurity threats since news reports come out about them often. If you work within the IT field, then you will probably know about every one of them. You will also…
You might be aware of cybersecurity threats since news reports come out about them often. If you work within the IT field, then you will probably know about every one of them. You will also…
As technology advances, so do home security systems. Originally, home security systems began with simple locks and eventually progressed into full-blown home surveillance systems. Now, home security systems are more user-focused and user-friendly than ever.…
Almost 25% of US households now have a smart lock. Alongside smart thermostats and lights, they have become one of the most popular Internet-of-Things devices, So popular that, in fact, they have a projected market…
Once a software has been hacked, it is pretty much up to digital forensics experts to determine what has happened. It’s a regular part of “after hack” procedures to call in the forensics response team…
IndustryTap has reported on biometrics in “New Biometric Platforms Help Developers Deploy Better Solutions” and “If Biometrics Can Prevent Civil War, What Else Can it Do?” Clearly, biometric systems are ready for primetime and are…
IndustryTap has reported on blockchain technology from its alleged founder, Satoshi Nakamoto, to its legalization by the New York State Department of Financial Services (NYDFS) and its role as a juggernaut that will change the…
Security is about trust. Companies that don’t have complete faith in the vendors or supply chains they use are taking huge risks as businesses and passing those risks onto their customers. The Common Criteria for…
Mobile Malware, the New Kid on the Block Most people have become reasonably adept at installing and keeping malware software up to date, yet some remain clueless and give life to black hats. But most…
News on cybersecurity and cyberwar has been bleak, but Peter Warren (P.W.) Singer & Allan Friedman, co-authors of “Cybersecurity and Cyberwar: What Everyone Needs to Know“, published last year, believe 94% of attacks can be…
More Vulnerable Than Ever Orwell’s 1984 vision is coming to fruition due to the unfettered advances of technology. Our bodies and lives are now immersed in gadgets that record everything and we can’t escape unless…