As it turns out, Google wants to employ Artificial Intelligence in moderating online communications. This activity implies a fine balance between the freedom of expression and various preset policies. These may involve anti-harassment measures or even cyber-security guidelines that moderate what
Yahoo breaches have become similar to Adobe Flash patches – one seems to hear about them endlessly. The company strives to explain and investigate. Yet there is even more to add to the damage report as time goes by. On top of this, cyber scammers and cyber-attackers may well take advantage of the u
Trying to decrypt the way Tesco Bank hackers operated, researchers unveiled a surprisingly fast and efficient method of hacking VISA cards. Successful in just 6 seconds, this technique, dubbed distributed guessing attack, allows cyber-attackers to access all necessary data and pose as credit card
In what anonymity networks are concerned, all discussions revolved so far around Tor, its characteristics, its Dark Web gateway providing quality and its crucial role in tracking criminals in a few famous cases. Now that MIT researchers developed the Riffle network, dedicated to a similar type of
Smartphones and phone-connected wearables are increasingly capable of collecting data on individuals and their environment via high-tech sensors. From heart rate, pulse, and body temperature to location, air quality, humidity and other relevant characteristics, the tiny elements embedded in our
Metadata represents the context generated by and/or surrounding all digital communications, or the traces left by digital data during its processing and digital existence. Since it may be construed as a digital halo that reflects the characteristics of the user data, metadata can be used for
URL shorteners are right under our eyes. You may have noticed how for a while now many of the links shared online, especially (but not exclusively) on social networks started to look like “http://tinyurl.com/SomethingSomething”. Replace tinyurl with goo.gl or bit.ly (where in both cases the inc
It is an element of progress to have our mouse or keyboard wirelessly communicating with the computer, but have you ever wondered what dangers lie dormant in this efficient technology? A pair of Bastille researchers decided to verify just how vulnerable remote peripherals are to malicious attacks
Searching for the optimum cyber-security defense configuration lead to the idea of employing machine learning in this field. Enterprises and researchers have regrouped their strategies in the aftermath of each and every notorious breach and attack, only to realize that this move will have to repeat
A survey on smart home and cyber-security, entitled “Behind our Digital Doors: Cybersecurity and the Connected Home”, revealed among other facts that 67% of the respondents possess between 1 and 5 Internet connected home devices, while 30% have 6 or more devices and 5% of households have 11 or more
ITCurated uses cookies to personalize your experience on our website. By continuing to use this site, you agree to our Cookie Policy