Google kills off the Captcha Feature

Share this

The online tests to check whether you’re a human or a robot  have been a necessary evil, but Google is finally killing them off in their current form. For some time now, Captcha has served as the primary way of telling humans and robots apart on the internet. It made sure that the person looking to access a website was actually a human being – ensuring that robots couldn’t be used to send spam or flood a website with requests. However, the technologies have become more complex and robots have…

Share this
Read More

Security of IoT Devices to Be Rated for First Time

Share this

IoT standards groups are emerging to address issues of inter operability, communication protocols and security. Consumer Reports will begin considering the cybersecurity and privacy safeguards of products when rating them – a long overdue move perhaps, given Internet of Things device manufacturers have previously been accused of doing the barest minimum to protect consumers. The firm will steadily implement the methodologies across its reviews, starting with test projects evaluating a small number of products. The move follows a surge in cyberattacks which have exploited vulnerabilities in Internet of Things devices such as webcams, routers, digital video…

Share this
Read More

Security Concerns Rising in the Age of IoT

Share this

IoT has gone mainstream. Home refrigerators are chattier than ever, and emerging virtual home assistants can order wings for dinner, turn on lawn sprinklers, start the car and purchase pounds of cookies. Yet behind the headlines of these gee-whiz cyber technologies lurks a shortcoming. It is one that poses significant threats to national security but could be remedied fairly easily, some experts offer. The mobile device and sensor industries lack uniform security standards and a system of checks and balances—something akin to the safety standards for electrical devices and components…

Share this
Read More

Old Windows malware may have tampered with 132 Android apps

Share this

Google has removed 132 apps from its Play store following a malicious coding flaw that was found possibly because the developers were using infected computers with malware, according to security researchers. The 132 apps were found generating hidden iframes, or an HTML document embedded inside a webpage, linking to two domains that have hosted malware, according to security firm Palo Alto Networks. Google investigation indicates that the developers of these infected apps are not to blame, but are more likely victims themselves. “We believe it is most likely that the…

Share this
Read More

WikiLeaks announces tech firm cooperation

wikileaks
Share this

The anti-secrecy platform WikiLeaks has said it would work with tech firms to fix security flaws before publishing them. Customers’ trust in firms like Google and Apple has already been eroded by the Snowden leaks. Google, Apple, Microsoft, Samsung and other major tech companies have been faced with new dilemmas by the latest WikiLeaks release. The “Vault 7” dump of CIA files has exposed a number of security breaches in their software, which US intelligence has exploited and kept secret so that it can continue to hack into smartphones, computers,…

Share this
Read More

FCC halts regulations to protect data security

Share this

Many people realize Web services like Facebook or Google are monitoring their activities and security is not guaranteed, but companies also collect data in less obvious ways. Large websites and smaller businesses running smartphone apps do everything they can to collect information to tailor advertising or sell it to third parties interested in doing the same. The Federal Communications Commission in the United states FCC has been pushing through rules requiring internet service providers to disclose in plain language how consumer data is collected, how it’s shared with third parties…

Share this
Read More

Amid cyberattacks, ISPs try to clean up the internet

Share this

Antivirus software is not what it used to be. The sneaky, sophisticated security threats your PC faces now have gone far beyond what traditional software can do. The future of protecting your PC will require a multi-pronged approach involving vigilant updates, bug bounties, and artificial intelligence. If your computer’s been hacked, Dale Drew might actually know something about that. Dale Drew, the chief security officer at a major internet backbone provider that’s routinely on the lookout for cyberattacks on the network level has led the company to linked more than…

Share this
Read More

New York unveils final cybersecurity regulations

Share this

Cybercriminals can cause significant financial losses for business entities as well as for  consumers whose private information may be revealed and/or stolen for illicit purposes. The financial services industry is a significant target of cybersecurity threats. The New York Department of Financial Services unveiled the final cybersecurity regulations, which includes certain regulatory minimum standards while encouraging firms to keep pace with technological advances. New York is the financial capital of the world, and it’s critical that we do everything in our power to protect consumers and our financial system from the…

Share this
Read More

Use of Ad-Blocking Software Rises by 30% Worldwide

ad blocker
Share this

People are increasingly using the technology on their mobile devices and computers to block intrusive advertisements while surfing the web. Facebook has tried to ban it. Google has attempted to outsmart it. But no matter what these tech giants do, people’s use of software to block digital advertising — often the lifeblood of companies’ online business models — keeps gaining traction worldwide. According to New York Times, roughly 11 percent of internet users globally relied on ad blockers to avoid some form of digital advertising last year when surfing the…

Share this
Read More

Big data can drive the future of cyber security

Data
Share this

Data science experts and big data enthusiasts are excited and prepared for a future that’s becoming increasingly connected to the web. Some techniques used to harness this raw information, such as data mining, help give us an insight into the future of cybersecurity and what areas may pique interest moving forward. A major benefit that big data provides in the realm of cybersecurity is the ability to monitor and track systems, usually contained within the cloud, for irregularities and potential breaches. Cloud Security Information and Event Management (CSIEM) allows users…

Share this
Read More