Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […] more…How the Trend to Conduct Psychometric Tests for Hiring/Promotion Has Started
There are different trends out there that are making a great impact on the business world. You can see the industry getting revolutionised through different latest strategies and methods. You can find tests that are specially used by the recruiters to ensure that the business is growing at a rapid pace. Certainly the steering at […] more…How Machine Learning Can Help Identify Web Defacement Campaigns
By Federico Maggi, Marco Balduzzi, Ryan Flores, and Vincenzo Ciancaglini Website defacement — the act of visibly altering the pages of a website, notably in the aftermath of a political event to advance the political agenda of a threat actor— has been explored in our various research works. We broke down top defacement campaigns in a […] more…Trojan watch
We continue to research how proliferation of IoT devices affects the daily lives of users and their information security. In our previous study, we touched upon ways of intercepting authentication data using single-board microcomputers. This time, we turned out attention to wearable devices: smartwatches and fitness trackers. Or more precisely, the accelerometers and gyroscopes inside […] more…More information
- Microsoft VBScript CVE-2014-0271 Remote Code Execution Vulnerability
- Adobe Acrobat and Reader APSB19-55 Multiple Arbitrary Code Execution Vulnerabilities
- Report: Like Stuxnet, the U.S. also built Flame virus
- Here’s how to best secure your data now that the NSA can crack almost any encryption
- North Korea-Linked Hackers Target U.S. Defense Contractors
- RSA Webinar Today: 6 Keys to Successful Identity Assurance
- Major Browsers to Kill TLS 1.0, 1.1
- Google Discontinuing Bluetooth Titan Security Key
- GitHub Discloses Details of Easy-to-Exploit Linux Vulnerability
- Microsoft Internet Explorer CVE-2014-1794 Remote Memory Corruption Vulnerability