Sternum blocks exploitation of critical Ripple20 vulnerabilities
Multilayered cyber security company providing real time embedded protection and visibility for IoT devices, Sternum has successfully blocked the exploitation of multiple critical Ripple20 vulnerabilities. Embedding Sternum’s Embedded Integrity Verification (EIV) into firmware containing the vulnerable TCP/IP stack led to EIV automatically blocking the exploit attempts of the vulnerabilities and reported the attempts in real t...
Fake news detection engine seeks to combat online harms
A fake news detection engine is aiming to combat cyber bullying and other online harms. It is being developed at the University of Exeter Business School. 'LOLA' uses sophisticated Artificial Intelligence (AI) to detect emotional undertones in language, such as anger, fear, joy, love, optimism, pessimism and trust.
Partnership to record agricultural data using blockchain
Finboot, the company behind the enterprise-grade blockchain middleware MARCO, has announced that it has partnered with Fidesterra, a Spain-based AgriTech group that is aiming to make agriculture more sustainable with the help of emerging technologies and to securely record agricultural data using blockchain. The partnership is one example of the way in which MARCO can be applied to AgriTech.
The 'mobius strip' of cyber security
Over the last few years, cyber security criminals have become more agile and possess a higher quality of skill than ever before. However, these skills come at a cost to industries worldwide. According to the Allianz Risk Barometer 2020, companies now see cybercrime as the biggest threat to their business, taking the top spot for the first time and ranking above threats such as climate change, natural disasters and market developments. By Miles T...
BlackBerry solutions address 96% of enterprise threat landscape
BlackBerry has announced findings from an independent Frost & Sullivan report which concludes that BlackBerry can secure all IoT endpoints, and upwards of 96% of all cyber threats. The report reviews the cyber threat landscape and the proportion of risks that BlackBerry’s suite of solutions protect enterprises against.
Business security not fit for home working
Almost half (48%) of business decision makers have admitted that their existing cyber security policies are currently not suitable for maintaining a 100% remote working model. This increased risk has led to nearly two thirds (65%) anticipating an increase in phishing and breach attempts, according to a new survey from Centrify, provider of Identity-Centric Privileged Access Management (PAM) solutions.
TPM 2.0 specification for rising cyber security threats
The Trusted Computing Group (TCG) has released its TPM 2.0 specification Revision 1.59 - providing necessary updates to the previously published TPM specification to combat the growing sophistication of cyber security threats worldwide.
Security solution for the Sheikh Khalifa Central Hospital
Siqura and TKH Security realised a fully integrated surveillance and access control system in the Sheikh Khalifa Central Hospital. This new hospital is located at the eastern edge of the emirate of Fujairah and will provide better 24/7 health services to citizens on the Eastern coast.
BlackBerry and Intel partner to stop cryptojacking malware
BlackBerry has announced the release of BlackBerry Optics v2.5.1100 with cryptomining and cryptojacking malware detection for Intel-based commercial PCs. To detect advanced cryptojacking malware, the BlackBerry Optics Context Analysis Engine (CAE) leverages unique CPU telemetry from Intel Threat Detection Technology (Intel TDT) to provide enterprises and SMBs unparalleled detection of cryptojacking attempts.
Infineon SECORA ID S security for electronic ID cards
With SECORA ID, Infineon Technologies offers an easy-to-integrate security platform for contactless digital ID documents. The first product variant, SECORA ID S, is a particularly flexible, Java-based solution. It simplifies and accelerates the design and production of region-specific sovereign documents such as eIDs in card format.