Three privacy issues in edge computing
The rapid development of the Internet of Things (IoT) generates massive amounts of data daily. Photographers, for example, can take 100 Mb of photos...
Common cybersecurity risks in robotics and mitigation strategies
Robotics uses sensors, control systems, manipulators, and software to efficiently manage and control devices for specific applications. These components communicate with each other by...
Documented cyber attacks in the aviation industry (2000-2020)
As a gateway to the external world, the aviation industry plays a strategic role everywhere. Any mistake in avionics, air-traffic controls, airlines, and airports...
How cyber criminals are using electromagnetic attacks
Electromagnetic radiation is everywhere today. That may sound scary, but most of it is harmless, with Wi-Fi, Bluetooth, cellular networks, and other radio waves...
Passwordless authentication – Why is it more secure?
Passwords, used for authentication, require users to create and memorize complex combinations of letters, numbers, symbols, and cases, to change them frequently, and to...
What is the true cost and scale of cyber warfare?
Due to the rapid development and widespread use of information technology, cyberspace has become essential to a state, society, and people's daily lives. Cyberspace...
Potential privacy and security threats against smart home devices
Smart homes are increasingly popular for IoT products and services with many promises for improving individuals’ quality of life. Typically, a smart connected home...
AI-driven smart malware – Next generation of threats
Recent developments in Artificial intelligence (AI) have a vast transformative potential for cybersecurity defenders and cybercriminals. Anti-malware solutions adopt intelligent techniques such as artificial...
Spyware detection techniques used for smartphones
We use our smartphones not only for making calls but for numerous other purposes surfing, messaging, gaming, shopping, banking, etc. Users can store all...
The future of automated pentest reporting tools: Trends and predictions
As technology advances and the need for robust cybersecurity measures increases, automated penetration testing (pentest) reporting tools have become essential to many organizations’ security...
How to protect your computers from spyware – Guidelines
Spyware is malicious software that can monitor and control your computer without your knowledge. While monitoring your internet browsing, it may record keystrokes, screenshots,...
Addressing common challenges in healthcare cybersecurity
The medical industry has one of the largest concentrations of valuable information for threat actors. The healthcare sector collects countless bytes of personally identifying...
















