Tags » Cyber Security

MIT: Novel transmitter protects wireless data from hackers

MIT researchers developed a transmitter that frequency hops data bits ultrafast to prevent signal jamming on wireless devices. The transmitter’s design (pictured) features bulk acoustic wave resonators (side boxes) that rapidly switch between radio frequency channels, sending data bits with each hop. 1,255 more words


F-Secure compie un grande passo avanti verso la leadership nella Cyber Security con l’acquisizione di MWR InfoSecurity

F-Secure annuncia oggi di aver siglato un agreement per acquisire tutte le azioni di MWR InfoSecurity, un’azienda privata globale di cyber security che opera in UK, USA, Sud Africa e Singapore. 1,131 more words

Cyber Security

Cyprus Shipping Chamber - Cyber Security Vulnerability Management Case Study

(http://www.MaritimeCyprus.com) There is a perception within the shipping industry that where cyber security is concerned; “it can’t happen to us”. The implementation of effective cyber security management, especially onboard vessels is a low-level priority and that simple anti-virus protection or that introducing an air-gap between critical systems is adequate. 212 more words

Loss Prevention

Kubernetes for Developers (LFD259)

Get advanced knowledge of application development using Kubernetes with training from The Linux Foundation!

Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. 197 more words

Cyber Security

Why Are You Still On Facebook?

After Facebook was recently found to be allowing users stuff to go wherever someone wanted it…..they, meaning the Zuck, went before Congress and promised that all would be rectified….Facebook even has an ad out now apologizing and the promise to do better……it is a fake as the Wells Fargo apology. 665 more words


Cyber security measures on financial services firms on the watch

Cyber security refers to protecting computers and Internet-based systems from unauthorized access to data, modifications, theft, and obliteration.

Nowadays, small and big financial firms are now using Web-based technology and tools to carry out their day-to-day functions swiftly and smoothly. 250 more words