The Latest in Tech Today

Algorithms Should be Fair — But they are not.

Algorithms Should be Fair — But they are not.

Algorithms Should be Fair -- But they are not.Kentucky lawmakers thought requiring that judges consult an algorithm when deciding whether to hold a defendant in jail before trial would make the state’s justice system cheaper and fairer by setting more people free....

read more
Successful Cybercriminals Require Your Help

Successful Cybercriminals Require Your Help

Successful Cybercriminals Require Your HelpMost cybercriminals target people, not infrastructure: More than 99% of emails distributing malware from 2018 into 2019 required human interaction to click links, open documents, accept security warnings, or complete other...

read more
Tesla Autopilot Feature Raises Issues

Tesla Autopilot Feature Raises Issues

Tesla Autopilot Feature Raises Issues   Yet another Tesla driver has apparently fallen asleep behind the wheel while his car cruised down the freeway. The latest video comes from the Boston area, where a local man caught a video of a Tesla driver and his...

read more
HIPAA Can’t Protect Privacy In Medical Apps

HIPAA Can’t Protect Privacy In Medical Apps

HIPAA Can't Protect Privacy In Medical Apps   Americans may soon be able to get their medical records through smartphone apps as easily as they order takeout food from Seamless or catch a ride from Lyft. But prominent medical organizations are warning that...

read more
No More Hiding -Google’s Tactics Under Scrutiny

No More Hiding -Google’s Tactics Under Scrutiny

No More Hiding -Google's Tactics Under ScrutinyOn Monday, 50 attorneys general from US states and territories signed onto an antitrust investigation into Google, placing even more pressure on the major tech firm that is already facing intense scrutiny over its market...

read more
Security Demands Up With 5G

Security Demands Up With 5G

Security Demands Up With 5GZhou Hongyi, co-founder of Chinese internet security provider Qihoo 360 Technology, expects the rollout of 5G mobile services and expansion of the industrial internet to open up more opportunities for the company in the world’s second...

read more
Are you ready? — Apple’s Product Announcement

Are you ready? — Apple’s Product Announcement

Are you ready? -- Apple's Product AnnouncementApple’s big hardware event for 2019 has wrapped, and, as expected, it brought a bounty of exciting announcements. Of course, the iPhone 11 happened — and, yes, a version is really called the iPhone 11 Pro Max — but there...

read more
Do You Own A Car That Spies On You?

Do You Own A Car That Spies On You?

Do You Own A Car That Spies On You?The secret sensors, fitted to all new and used motors sold by the firm’s dealers, pinpoint the vehicle’s exact location. The firm sold more than 170,000 new cars in Britain alone last year. Mercedes will not say how long it has used...

read more
Companies Sharing Your Data with Their Third Party Vendors

Companies Sharing Your Data with Their Third Party Vendors

Companies Sharing Your Data with Their Third-Party VendorsIt seems that every day there's another news headline about how companies are using consumer data. Facebook was in the news again recently when the FTC slapped it with a $5 billion fine based on investigations...

read more
Security Protections Badly Needed On Routers

Security Protections Badly Needed On Routers

Security Protections Badly Needed On RoutersNew testing by Consumer Reports shows important differences in how routers from popular brands handle digital security. Some of the 29 routers we examined this spring and summer build in important safeguards, such as...

read more
Why would a Salesman Dis the Product he Sells

Why would a Salesman Dis the Product he Sells

Why would a Salesman Dis the Product he SellsCurrent mass market security solutions can’t keep up with all the cybercrime exploits. It turns out that some of their salesman now know the truth about what they are representing. 

read more
Cloud Services Have a Dark Side When It Comes To Security

Cloud Services Have a Dark Side When It Comes To Security

Cloud Services Have a Dark Side When It Comes To SecurityMore than half of firms running multicloud environments have been hit with a data breach in the past year, compared with 24% of hybrid cloud organizations and 24% of single-cloud users. To gain a better...

read more
Can your CEO’s Voice be Faked?  How would you know?

Can your CEO’s Voice be Faked? How would you know?

Can your CEO’s Voice be Faked? How would you know?Fraudsters are constantly looking for new ways to scam their victims. One unique case gives the security industry a glimpse of what they could do with artificial intelligence (AI) and voice recording. As part of an...

read more
Security Alerts — How to tell Which are Important.

Security Alerts — How to tell Which are Important.

Security Alerts — How to tell Which are Important.   Alert fatigue is becoming a universal problem, and it's mainly due to a reactionary cybersecurity marketplace where security operations teams are challenged with transforming their approaches to keep pace with...

read more
Inflammation Problem Try Intermittent Fasting

Inflammation Problem Try Intermittent Fasting

Inflammation Problem Try Intermittent Fasting    Fasting could provide "enormous potential" in managing or preventing inflammation which is thought to contribute to type 2 diabetes, US researchers have said. A team from the Mount Sinai hospital report that...

read more
Paying Ransom’s Fuels Rise in Ransomware

Paying Ransom’s Fuels Rise in Ransomware

Paying Ransom’s Fuels Rise in Ransomware   On June 24, the mayor and council of Lake City, Florida, gathered in an emergency session to decide how to resolve a ransomware attack that had locked the city's computer files for the preceding fortnight. Following the...

read more
Business Email Compromise Group Charged in Bust

Business Email Compromise Group Charged in Bust

Business Email Compromise Group Charged in Bust   Eighty people have been charged for their roles in a massive and complex fraud operation that attempted to steal $46 million in business email compromise (BEC) and romance scams, according to the US Department of...

read more
The number of Users make this Company a Hacking Target

The number of Users make this Company a Hacking Target

The number of Users Makes this Company a Hacking Target   One of the biggest players in enterprises is Microsoft and because they are so huge they are a target for phishers because if they can compromise a single user they can get access to your entire O365...

read more
Unsecured IoT is a Playground for Hackers

Unsecured IoT is a Playground for Hackers

Unsecured IoT is a Playground for Hackers Playground   Microsoft made news recently at the annual Black Hat conference in Las Vegas, generating a lot of buzz about its discovery of a malicious Russian hacker group using some common Internet of Things (IoT)...

read more
What is More Destructive a Nuclear Weapon or Cyber Attack

What is More Destructive a Nuclear Weapon or Cyber Attack

What is More Destructive a Nuclear Weapon or Cyber Attack   People around the world may be worried about nuclear tensions rising, but I think they’re missing the fact that a major cyberattack could be just as damaging – and hackers are already laying the...

read more
Missing Updates on Applications Creates Vulnerabilities

Missing Updates on Applications Creates Vulnerabilities

Missing Updates on Applications Creates Vulnerabilities   Avast’s PC Trends Report 2019 found that users are making themselves vulnerable by not implementing security patches and keeping outdated versions of popular applications on their PCs. The applications...

read more
Your Login Credentials are Keys to the Kingdom for Hackers

Your Login Credentials are Keys to the Kingdom for Hackers

Your Login Credentials are Keys to the Kingdom for Hackers   A recent study published by Google estimates that 1.5% of all login credentials used across the web have been compromised in data breaches and are vulnerable to credential stuffing attacks. Google has...

read more
Malcare WordPress Security