cyber threats

cyber threats news search results

Developer news items we found relating to cyber threats

32 results
Emerging-features-to-consider-for-mobile-app-development

Emerging features to consider for mobile app development


Wednesday, November 13, 2024 by

In an era where mobile applications are ubiquitous, with a staggering 8.93 million apps vying for attention across various app stores, distinguishing your app from the competition is paramount. While aesthetics undoubtedly play a role in user attraction, it is the functionality and features of an app that truly captivate and retain users. Whether you are embarking on yo...


Developers-threatened-by-DOJ-proposals-says-Google

Developers threatened by DOJ proposals says Google


Monday, October 21, 2024 by

The U.S. Department of Justice (DOJ) has shared a broad outline of radical changes it may demand as part of its lawsuit regarding search distribution. This marks the beginning of a lengthy process, and Google plans to respond in detail to the DOJ's ultimate proposals as it prepares its case in court next year. However, concerns have arisen that the DOJ is signaling ...


Google-AdSense-updates-revealed-for-new-US-state-privacy-laws

Google AdSense updates revealed for new US state privacy laws


Friday, October 18, 2024 by

Google AdSense has released an important update addressing upcoming privacy laws in five US states. With new privacy regulations taking effect in Iowa, Delaware, New Jersey, Nebraska, and New Hampshire in early 2025, AdSense users and publishers will see key changes designed to ensure compliance and transparency. Google AdSense updates announced for the new US state ...


Increasing-cyber-threats-from-artificial-intelligence

Increasing cyber threats from artificial intelligence


Wednesday, October 9, 2024 by

The UK Cybersecurity M&A market has grown significantly over the past decade, with the deal volume trend line increasing, and the sector continuing to attract significant investment from Private Equity, alongside larger corporates consolidating emerging technologies to counter increasingly sophisticated threats. The UK National Cyber Security Centre has...


Vulnerabilities-in-Apple-products-alert

Vulnerabilities in Apple products alert


Monday, September 30, 2024 by

CERT-In has recently issued Advisory CIAD-2024-0046, highlighting multiple high-severity vulnerabilities in Apple products. The vulnerabilities affect a wide range of Apple software, including iOS versions prior to 18, iPadOS versions prior to 18, macOS Sonoma versions prior to 14.7, macOS Ventura versions prior to 13.7, and the upcoming macOS Sequoia versions prior to ...


AWS-introduces-Mithra-advanced-threat-intelligence-neural-network

AWS introduces Mithra advanced threat intelligence neural network


Thursday, August 15, 2024 by

In a recent blog post from AWS, Amazon Chief Information Security Officer CJ Moses detailed the robust threat intelligence capabilities that safeguard AWS customers. Through tools like Mithra and MadPot, AWS collects and analyzes vast data, identifying and neutralizing threats with unparalleled accuracy and speed. AWS's proactive approach to sharing high-fidelity th...


Rise-in-cyberattacks-is-alarming-folks

Rise in cyberattacks is alarming folks


Friday, June 28, 2024 by

A recent study has uncovered a startling rise in cyberattacks from 2022 to 2023. Throughout 2023, the United States experienced an alarming 3,205 data breaches, marking a dramatic 78% surge from the 1,801 incidents reported in 2022.  The study conducted by data collection experts SOAX utilized data from the Identity Theft Resource Center on the number of data vi...


Cybersecurity-AI-trends-in-2024-according-to-Edgio

Cybersecurity AI trends in 2024 according to Edgio


Thursday, December 21, 2023 by

Looking ahead to 2024 and beyond, it is clear that the cybersecurity skills gap will only continue to widen. However, by leveraging AI tools and investing in the development of skilled cybersecurity professionals who can work effectively with these tools, organizations can better protect their networks and data from cyber threats and ensure they remain resilient in an i...


App-server-market-size-expected-to-reach-52B-by-2030

App server market size expected to reach 52B by 2030


Wednesday, November 1, 2023 by

The platform called an application server is typically used for cloud-based apps for mobile devices like tablets and smartphones. While allowing the right to access and the functionality of the corporate application, the application server serves as the host for the user's business logic. The banking, financial services, and insurance (BFSI) industry are always d...


NFT-marketplace-and-gallery-to-launch-from-Trend-Innovations

NFT marketplace and gallery to launch from Trend Innovations


Wednesday, April 26, 2023 by

Trend Innovations Holding Inc. has recently announced that they will combine two recent acquisitions to upgrade and launch a more robust version of the company's newly acquired InstantFAME platform. InstantFAME is a mobile and web application, which operates in the multi-billion-dollar digital artwork marketplace for artists to securely publish and sell their d...


NET-MAUI-and-the-end-of-IE

NET MAUI and the end of IE


Thursday, August 4, 2022 by

Earlier this year, Microsoft announced the general availability of .NET MAUI, enabling developers to build cross-platform applications from a single codebase, saving costs, and eliminating the need to maintain multiple codebases. According to Microsoft, the primary goal of .NET MAUI is to enable developers "to deliver the best app experience as designed speciall...


PKI-Spotlight-security-solution-launches

PKI Spotlight security solution launches


Wednesday, April 6, 2022 by

PKI Solutions announced the introduction of PKI Spotlight, an industry solution that provides real-time monitoring and alerting of the availability, configuration, and security of all organizations' PKI environments, all consolidated into one easy-to-use dashboard. PKI is a foundational technology for almost every identity and data encryption solution...


HackNotice-announces-threat-intelligence-platform

HackNotice announces threat intelligence platform


Friday, September 18, 2020 by

HackNotice announced the launch of HackNotice Teams, a cybersecurity management platform powered by actionable threat intelligence and an industry solution to foster a company-wide culture of security. Built on HackNotice Premium’s technology, HackNotice Teams scours the dark web to alert employees of vulnerabilities, compromised information, and data breaches in ...


To-encrypt-or-not-encrypt-legacy-devices-no-longer-a-choice

To encrypt or not encrypt legacy devices no longer a choice


Thursday, March 19, 2020 by

Encryption forms a strong layer of protection for our data and a last line of defense against cybercrime. By deploying encryption, users can render their data unreadable if it is compromised. Whether that means hackers intruding into the network, or an employee unwittingly exposing sensitive information, the data will be useless to any unauthorized agents who happe...


Experience-Center-worldwide-launches-from-Microsoft

Experience Center worldwide launches from Microsoft


Monday, November 18, 2019 by

Microsoft has also reimagined the future of work by creating a blueprint for productivity, efficiency, accessibility, flexibility, and collaboration for organizations in the region. In a world where we can expect more than 40 billion devices generating nearly 80 zettabytes (ZB) of data by 2025, organizations and industries will need to quickly adopt new tec...


Warnings-for-aircraft-cybersecurity

Warnings for aircraft cybersecurity


Thursday, August 1, 2019 by

The Department of Homeland Security issued a security alert for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft. Engine readings, compass data, altitude and other readings “could all be manipulated to provide false measurements to the pilot,” according to the DHS alert.&nbs...


The-most-popular-gaming-platform,-and-why-cloud-gaming-sucks

The most popular gaming platform, and why cloud gaming sucks


Friday, March 22, 2019 by

Gamers spend an average of 7 hours, 7 mins each week playing (up 19% from last year), and cloud is the next frontier for video games it seems, with major tech players like Microsoft and Google teasing their cloud gaming launches at GDC 19. But getting gamers on board with these new services will require developers to create interactive games that don’t frustr...


Code-security-gamification-company-nabs-$3.5M-in-funding

Code security gamification company nabs $3.5M in funding


Friday, September 14, 2018 by

Secure application development platform provider Secure Code Warrior announced that it has gained US $3.5 million in funding from two strategic venture capital firms. The financing was led by Washington DC-based Paladin Capital Group, with participation from Sydney-based AirTree Ventures. The initial funding round will allow the company to further expand its rapidly gro...


How-the-reddit-security-breach-reminds-us-to-be-careful

How the reddit security breach reminds us to be careful


Monday, August 6, 2018 by

reddit recently disclosed in their announcements feed of a security breach into their system which the hacker "managed to access some user data, including some current email addresses and a 2007 database backup containing old salted and hashed passwords." Include in the disclosed information was some reddit source code and some log files. They went on to sa...


Autonomous-vehicles-and-data-collection-talks-coming--August-78

Autonomous vehicles and data collection talks coming August 78


Wednesday, August 1, 2018 by

Three no-cost discussion sessions will explore the growing importance of data capture, use and safe/reliable storage in vehicles and the autonomous transportation at the Flash Memory Summit August 7-8 at the Santa Clara Convention Center. During the free sessions; engineers, executives, urban planners, government officials and transportation researchers will explore ...


Avoid-mobile-cybersecurity-threats-by-checking-the-source

Avoid mobile cybersecurity threats by checking the source


Thursday, July 5, 2018 by

Earlier this month IT news organizations around the globe reported that Epic Games’ popular Fortnite game was being counterfeited and malicious actors were, in fact, lacing the imposter apps with malware. We’re only human, and people unwittingly let their guard down in anticipation of something they're passionate about, or when they think they might b...


Questioning-the-future-of-privacy-and-the-safety-of-personal-identity

Questioning the future of privacy and the safety of personal identity


Thursday, June 28, 2018 by

While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able to protect their privacy and online identity, even with precautionary measures and new regulations such as GDPR. These findings and more are outlin...


This-API-api-security-solution-to-use-AI

This API api security solution to use AI


Thursday, February 1, 2018 by

To protect global organizations against ever-increasing security threats, Axway has announced a global partnership with Elastic Beam. Together, the two companies will help organizations achieve optimal security and ecosystem engagement by leveraging an AI engine, integrated with Axway API Gateway, that automatically detects and blocks new attacks on APIs. The Elastic Be...


The-future-of-cybersecurity-in-machine-learning

The future of cybersecurity in machine learning


Sunday, July 30, 2017 by

McAfee, a cybersecurity company, has announced several new innovations that expand machine learning and automation capabilities to strengthen human-machine teams. Plus, McAfee announces support of OpenDXL.com, a new, independent collaboration portal that offers forums and free apps, giving OpenDXL users easy access to ideas and resources available for application integr...


Intel-security-becomes-McAfee

Intel security becomes McAfee


Tuesday, April 4, 2017 by

McAfee has begun operating as a new standalone company. Built on the belief that “Together is Power,” the new McAfee will expand upon its leading security solutions platform to better enable customers to effectively identify and orchestrate responses to cyber-threats. The launch of McAfee marks the closing of the previously announced investment by TPG and Inte...


What-works-best-with-IoT-devices:-hardware-vs-software-presentation

What works best with IoT devices: hardware vs software presentation


Thursday, March 2, 2017 by

Icon Labs, a provider of security solutions for IoT and edge devices, has announced Icon Labs President Alan Grau has been selected to present at Embedded World Show Europe. Alan’s presentation will provide engineers, product managers and executives with an overview of the available security technologies for the IoT and IIoT, and a framework to start building secur...


Security-Intelligence-Platform-from-Exabeam-launched

Security Intelligence Platform from Exabeam launched


Thursday, February 2, 2017 by

Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and intern...


Humans-are-still-the-biggest-threat-to-cyber-security-report-shows

Humans are still the biggest threat to cyber security report shows


Saturday, December 17, 2016 by

Global technology company Nuix have released the findings from its third annual survey of corporate information security practitioners who almost universally agreed that human behavior was their largest security threat. While businesses were investing to develop broad and mature cybersecurity capabilities, many survey respondents were uncertain about the most effective ...


Rackspace-Grants-Early-Access-to-Its-Managed-Security-for-Azure

Rackspace Grants Early Access to Its Managed Security for Azure


Sunday, August 14, 2016 by

Rackspace has announced early access to its Rackspace Managed Security for Microsoft Azure allowing those using Microsoft Azure, Amazon Web Services (AWS), Rackspace Dedicated Hosting and Rackspace Managed VMware Cloud to receive additional security protections provided by Rackspace Managed Security to detect and respond to security threats across cloud platforms.The pl...


Report-Details-Cybersecurity-Implications-for-the-Energy-Sector

Report Details Cybersecurity Implications for the Energy Sector


Thursday, April 21, 2016 by

ScottMadden has released a report highlighting the future implications on cybersecurity for the energy sector. The report outlines the significant changes to the energy grid taking place in certain parts of the US which will result in significant exchanging of confidential information - information that has traditionally remained within the control of utilities. In...


Why-Privileged-Identity-Management-is-Critical-for-Secure-IT-Outsourcing

Why Privileged Identity Management is Critical for Secure IT Outsourcing


Thursday, January 21, 2016 by

We visited with  David McNeely, VP of Product Strategy at Centrify, to talk about why secure privileged identity management is critical as more of today’s businesses are outsourcing IT functions and relying on vendors to troubleshoot systems and applications. Centrify recently released a new privileged identity management solution supporting federated privileg...


App-Developers:-How-to-Protect-Your-Apps-From-Being-Hacked-in-2014

App Developers: How to Protect Your Apps From Being Hacked in 2014


Wednesday, January 15, 2014 by

With 2013 behind us we are left with the memory of a massive increase and change in cyber criminal behavior, as well as some foresight into 2014 and the things developers can do to protect applications from hacking. As the Internet of Things (IoT) creates more situations where our daily lives, our governments, our utilities, our homes, and our businesses can be manag...