Risk managers in South Africa must suffer perpetual headaches these days. There is a crammed list of risk management priorities to constantly monitor. These include variable water and electricity supply, physical crime,…
Risk managers in South Africa must suffer perpetual headaches these days. There is a crammed list of risk management priorities to constantly monitor. These include variable water and electricity supply, physical crime,…
Researchers from the Singapore University of Technology and Design (SUTD) released 16 new security vulnerabilities, with the codename BrakTooth, affecting a wide range of Bluetooth classic (BR/EDR) implementations. The report, done in…
A rude awakening came to thousands of Americans in early May. Many motorists who had never seen the effects of a devastating ransomware attack found themselves scrambling to find a flowing gas…
It’s now well known that usernames and passwords aren’t enough to securely access online services. A recent study highlighted more than 80% of all hacking-related breaches happen due to compromised and weak…
What do cyberspace and outer space have in common? As we make clear in a new report to the Department of Defence, both are new frontiers for national security that blur traditional…
Those entrusted with securing the nation’s voting systems must remain nonpartisan as a myriad of complex and growing risks continue to threaten U.S. elections, one of the nation’s top cybersecurity officials said…
Right now, there is a good chance your phone is tracking your location—even with GPS services turned off. That’s because, to receive service, our phones reveal personal identifiers to cell towers owned…
An anticounterfeiting smart label and security platform which makes forgery fundamentally impossible has been proposed. The device accomplishes this by controlling a variety of information of light including the color, phase, and…
When it comes to passwords, the challenges are endless. We must create multiple passwords to manage our many online accounts, from email to shopping sites and social media profiles. We have…