Augmenting third-party solutions
How to safeguard your solution and clients with time-tested technologies.
31 articles
How to safeguard your solution and clients with time-tested technologies.
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.
We’re hosting an online workshop at the European Information Security Summit 2018 to help businesses get their networks prepared for new and emerging threats.
The cryptomining boom is helping scammers make money out of thin air. The latest method involves fake currency and ransomware.
The newest threats you should know about, and measures worth taking to keep your business and clients safe.
Who is mining cryptocurrency such as bitcoins — and where have all the graphics cards gone?
In 2010 owners of the largest facial database in the world — Facebook — learned how to distinguish a portrait from a landscape: the social network searched for faces in
Since last year, there is no doubt that it’s possible to take control over a connected car remotely. Despite this, we can see zero uncontrolled cars on the streets that
In the beginning of 2015, USA Today launched a wave of publications on a handheld radar called RANGE-R that has been used by the U.S. police and other government services. The radar system
We are living in a fascinating era when the technologies which seemed like they were from science fiction are entering our everyday lives. Or, at least, they’re making the first