Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […] more…How the Trend to Conduct Psychometric Tests for Hiring/Promotion Has Started
There are different trends out there that are making a great impact on the business world. You can see the industry getting revolutionised through different latest strategies and methods. You can find tests that are specially used by the recruiters to ensure that the business is growing at a rapid pace. Certainly the steering at […] more…How Machine Learning Can Help Identify Web Defacement Campaigns
By Federico Maggi, Marco Balduzzi, Ryan Flores, and Vincenzo Ciancaglini Website defacement — the act of visibly altering the pages of a website, notably in the aftermath of a political event to advance the political agenda of a threat actor— has been explored in our various research works. We broke down top defacement campaigns in a […] more…Trojan watch
We continue to research how proliferation of IoT devices affects the daily lives of users and their information security. In our previous study, we touched upon ways of intercepting authentication data using single-board microcomputers. This time, we turned out attention to wearable devices: smartwatches and fitness trackers. Or more precisely, the accelerometers and gyroscopes inside […] more…More information
- RubyGems DNS flaw now patched after second try
- The Rise and Precarious Reign of China’s Battery King
- Resolved: Lynda service is unavailable
- Germany Probes Suspected New Case of US Spying: Report
- Are digital retailers focusing their security in the wrong place?
- Cisco Patches Severe Vulnerabilities in Nexus Dashboard
- NTP CVE-2018-7185 Denial of Service Vulnerability
- York Campus Router Upgrade
- Inside Microsoft’s AI Comeback
- NSA collected 56,000 US emails a year