Detect cyber attacks on smart devices in the home
A novel system capable of detecting and classifying cyber attacks on smart devices around our homes has been developed by experts at Cardiff University. The system can distinguish between malicious or benign activity and detect attacks on devices such as the Amazon Echo Dot and Apple TV with a 90% accuracy.
Internet overwhelmed by identity theft worries
A new report from cyber security provider F-Secure has found that a steady barrage of major data breaches have left a vast majority of consumers worried about the online crimes that lead to identity theft and account takeovers.
Liveness detection provides security against identity fraud
Mitek has announced new innovation in its Liveness Detection feature. As a provider of Liveness Detection, Mitek is extending its technology to offer virtually spoof-proof facial comparison across all digital channels (native and web) - through one simple selfie. There are no additional steps for the consumer.
Context-sensitive application security training
Parasoft has announced a partnership with HackEDU, an interactive cyber security training company. This new partnership will allow organisations to train their developers and testers with context-sensitive application security training on the latest threats and mitigations for modern secure software development.
Cyber security dictates stability of societies
TÜV Rheinland, an international provider of testing, inspection and certification services, has released its seventh annual report on cyber security trends for 2020. The report is a collaboration between many of TÜV Rheinland‘s leading cyber security experts globally, and discusses seven key cyber security trends which will be important to be aware of in 2020.
When should you to secure your embedded systems?
Earlier this spring, a report was published describing how hackers used a network-connected, but unsecured, fish-tank thermometer in a casino lobby to break into the network and steal data. The incident raises yet another spotlight on how vulnerable embedded systems can be without proper protection. By Scott Jones, Managing Director, and Nathan Sharp, Sr. Business Manager, Embedded Security
93% of mobile transactions blocked as fraudulent in 2019
Ninety-three percent of total mobile transactions in 20 countries were blocked as fraudulent in 2019 according to a report on the state of malware and mobile ad fraud released today by mobile technology company, Upstream.
How are cyber attackers targeting the healthcare sector?
Healthcare data has long been one of the favourite targets for cyber attackers. A set of medical records can provide a wealth of data for criminals to conduct fraud or launch more effective targeted attacks. By Matt Walmsley, Director EMEA at Vectra
Securing systems: Four top tips for design engineers
Scott Best, Technical Director of Anti-Counterfeiting Products, Rambus, explains the role of cryptographic ICs. As system counterfeiting attacks continue to send shockwaves across industries, design engineers are evaluating how best to deploy cryptographic authentication integrated circuits (ICs) to secure systems. While there is no shortage of options available, in reality many of these solutions provide very poor levels of additional secur...
Future impacts of AI on cyber crime
Dave Palmer, Director of Technology at Dark Trace, an AI company that specialises in products and systems that can automatically recognise the signs of a cyber attack and interrupt them before a crisis occurs, recently hosted a session at the IoT Expo event in London, where he addressed some of the sensational headlines around how AI is going to supercharge cyber crime.