Blog
Cyber Security Today – Wi-Fi vacuum cleaner a threat, more WordPress plugin hacks, the worst stores for unsafe Android apps
																					 March 2, 2020   
                            
														
													
								0 Comment							
						
					
							By Howard Solomon
				Is your vacuum cleaner spying on you?Maybe, if it’s connected to the Internet.Researchers at security firm Checkmarx have been looking into several Internet-connected devices, including the Trifo Ironpie M6, one of a number of circular vacuum cleaners being sold that automatically sweeps your floors and carpets. What makes the Trifo			
			
			
		Exploring the cutting edge of AI in Cybersecurity
																					 March 2, 2020   
                            
														
													
								0 Comment							
						
					
							By Allen Bernard
				As good at artificial intelligence is at spotting hidden patterns and advanced cybersecurity threats, it isn’t ready to take humans out of the loop. With the number of cybersecurity threats increasing daily, the ability of today’s cybersecurity tools and human cybersecurity teams to keep pace is being overwhelmed by an			
			
			
		By Esther Shein
				Without regulation and strong proactive measures, 5G networks remain vulnerable to cyberattacks, and the responsibility falls on businesses and governments. Seemingly everywhere you turn these days there is some announcement about 5G and the benefits it will bring, like greater speeds, increased efficiencies, and support for up to one million			
			
			
		Follow the Cybersecurity money
																					 March 2, 2020   
                            
														
													
								0 Comment							
						
					
							By Lee Sustar
				For anyone who’s made it through the twin expo floors at the annual RSA Conference – past the big-name vendors with magicians, fast-talking comedians, flashy free gadgets and weighty swag bags – you’ll find a collection of startup booths with basic brochures, big ideas and an intriguing demo. But will			
			
			
		By BRIAN FINCH
				In 1983 computer science Ph.D. student Fred Cohen developed a novel software program that would surreptitiously install itself on host computers and quietly surrender all rights, privileges, and data to Cohen. Upon seeing the extraordinary success of the software after it was tested on university computers, Professor Len Adelman commented			
			
			
		




