Hacking an autonomous vehicle – Common attacks and vulnerabilities
Autonomous vehicles (AVs) incorporate several key technologies to enable driverless, safe, and efficient transportation. They use sensor technology and advanced driver assistance systems to...
Common and unexpected ways Malware infections can occur
Malware infections pose a significant threat to our digital lives, and cybercriminals continually find new and innovative ways to infiltrate our devices. While some...
Six reasons to ban lethal autonomous weapon systems (LAWS)
Lethal Autonomous Weapon Systems (LAWS), often referred to as "killer robots," are a new class of weapons that utilize sensors and algorithms to autonomously...
Securing government departments in the cloud for better cyber security
In today's digital age, Information Technology Security, also known as IT Security, plays a crucial role in protecting sensitive data and ensuring the smooth...
7 Tips to Identify a Social Engineering Attack
Social engineering is a popular tactic cybercriminals use to infiltrate servers, networks, and hardware or steal sensitive data and account information. It includes any...
Granting third-party data access: Overcoming the major challenges
Giving data access to third parties can be seen as a necessary evil for many companies. Companies often need to collaborate with third-party organizations,...
Busting myths about biometric identification and authentication
Biometric authentication is an automated method of identifying or verifying a living person's identity in real-time, based on distinctive personal traits or physiological characteristics,...
Top three robots used for law enforcement during lockdown
Placing cops on duty for maintaining law and order during a nationwide COVID-19 lockdown, especially in virus-contaminated bio-hazardous zones like hospital isolation wards, quarantine...
Top 7 industries Blockchain can transform
All transactions in the current digital economy rely on trust - whether it’s an email service provider ensuring that our emails have been delivered,...
How to communicate a cyber security incident?
When a cyber security incident occurs, the incident response team should immediately create a concrete communication plan for the specific incident. Companies must develop...
Tools & security tips: How to leverage the full potential of data
Data is an invaluable asset that a company has. Day in and day out, we witness attacks on big brands where important data is...
4 popular network protocol analyzers
Network protocol analyzers, also known as packet sniffers or packet analyzers, are software tools used to monitor, capture, analyze, and interpret network traffic. They...