New Cyber Technologies

Chrome and Firefox Headless Modes May Prompt New Adware & Clickfraud Tactics

Chrome and Firefox Headless Modes May Prompt New Adware & Clickfraud Tactics

During the past month, both Google and Mozilla developers have added support in their respective browsers for "headless mode," a mechanism that allows browsers to run silently in the OS background and with no visible GUI. Until now, headless browsers were forks of well-known browser engines adapted to run in headless mode, used only by developers for automated tests. This type of testing allows...

UK: Voice Biometrics Relatively Unheard Yet

UK: Voice Biometrics Relatively Unheard Yet

According to Ravin Sanjith, analyst at Opus Research, a large amount of fraud begins in bank contact centers where fraudsters use techniques to steal personal information and then use it to commit a crime. Third-factor authentication, such as biometrics, is more secure but there are fears around its use. But unlike first-factor authentication, biometrics cannot be stolen and unlike second-factor...

Walk up to the Front of Security Line at LAX with a Fingerprint and Iris Scan

Walk up to the Front of Security Line at LAX with a Fingerprint and Iris Scan

With a fingerprint and a quick iris scan, passengers flying out of Los Angeles International Airport (LAX) can now confirm their identity biometrically and avoid at least part of the airport’s security screening line. Clear, a New York-based identity-authentication company, began operations at LAX on Wednesday. Membership for the service is $179 per year, with discounts for some airline loyalty...

Ping Incorporates Multi Factor Authentication Security in Mobile Apps

Ping Incorporates Multi Factor Authentication Security in Mobile Apps

At the 2017 Cloud Identity Summit this week, Ping introduced the PingID SDK, a software development kit that's designed to help developers easily add multifactor authentication security into their mobile apps. Ping Identity CEO Andre Durand said that while the PingID SDK may seem small, it addresses a big issue with mobile apps. "That's actually a pretty big deal to have strong authentication...

Trusted IDs Gain Approval in Smart Building Environment

Trusted IDs Gain Approval in Smart Building Environment

As smart buildings increasingly pop up on the corporate landscape, the need to connect these intelligent structures to workers will increasingly grow, according to a survey released recently by IFSEC Global. According to the survey, 85% of survey respondents know that identities can be connected to various systems and devices, while more than 60% feel having all their identities on one ID card or...

ProtonMail Launches Free VPN to Fight Privacy 'Abuse' from Tech Giants

ProtonMail Launches Free VPN to Fight Privacy 'Abuse' from Tech Giants

Encrypted email provider ProtonMail's free VPN service, ProtonVPN, is now available to the general public, the company announced on Tuesday. ProtonVPN has been in beta testing and development for a year, and is now available for free. The internet has shifted from its previous position as a "beacon of hope and freedom" to become a "tool for oppression and control," according to a ProtonVPN press...

Can Blockchain Technology Transform ID?

Can Blockchain Technology Transform ID?

Blockchain is increasingly getting attention as a way to manage and verify data for governments and large institutions. Accenture and Microsoft are teaming up on a blockchain-based solution to create digital identity as a means to offer personal documentation for refugees. The effort is one part of a United Nations-based program called ID2020 that is aimed at solving the problem of lack of...

  • More at FCW
  • |
  • |
Satellites Can Be Adapted for Extremely Secure Data Encryption

Satellites Can Be Adapted for Extremely Secure Data Encryption

Methods for quantum encryption don’t work over long distances because residual light losses in optical fibers used for telecommunications networks on the ground degrade the sensitive quantum signals. Quantum signals cannot be also regenerated without altering their properties by suing optical amplifiers as it is done for classical optical data. A satellite-based quantum-based encryption network...

China Bounced an 'Unhackable' Quantum Signal Between Cities

China Bounced an 'Unhackable' Quantum Signal Between Cities

Quantum cryptography could help lay the groundwork for tomorrow's quantum networks but it faces a significant physical hurdle: entangled photons are hard to transmit long distances. Researchers from the Chinese Academy of Sciences may have the solution. You just have to send the photons 745 miles into space. "It's a challenging task," physicist Chao-Yang Lu, told Wired. "It's like you have to...

World's Most Robust Particle Collider Taps AI to Expose Hack Attacks

World's Most Robust Particle Collider Taps AI to Expose Hack Attacks

CERN—the European Council for Nuclear Research lab—is opting for a new approach to protect a computer grid used to produce data by the Large Hadron Collider (LHC). The LHC’s main job is to collide atomic particles at high-speed so that scientists can study how particles interact. Particle detectors and other scientific instruments within the LHC gather information about these collisions,...

Four Free Cybersecurity Tools Startups Can Utilize

Four Free Cybersecurity Tools Startups Can Utilize

Investing in online security remains a key challenge for startup owners. Unfortunately, the majority of available solutions cost a lot. On the other side of the coin, there are examples of freeware you can try. Here are four great ones to check out: 1) IT Security – Soteria: Free services include phishing detection and takedown, reputation monitoring, and endpoint compliance monitoring and...

  • More at Tech
  • |
  • |
Nmap 7.50 Launched With Many Marked Improvements

Nmap 7.50 Launched With Many Marked Improvements

The Nmap project announced the release of Nmap 7.50, the first big release since last December that has hundreds of improvements. “It is a replacement for WinPcap, which served us well for many years, but is no longer maintained. Npcap uses newer APIs for better performance and compatibility, including Windows 10 support. We also added loopback packet capture and injection, raw wireless...

The New Microsoft Modern Keyboard: It Lets you Forget Your Password

The New Microsoft Modern Keyboard: It Lets you Forget Your Password

Microsoft announced another Bluetooth keyboard that will work with any machine, not just a surface device. But the Microsoft Modern Keyboard also adds in a convenient way to access Windows 10’s Hello password-less login technology, MSPoweruser reports. The Modern Keyboard adds in a fingerprint scanner on a dedicated key that ties in with Windows Hello. That means you can simply tap that key...

Secret Weapon of Facebook to Fighting Terrorists is Human Experts and AI

Secret Weapon of Facebook to Fighting Terrorists is Human Experts and AI

Facebook has declared that it is actively fighting terrorism online, and it is using artificial intelligence (AI) to do so. The post said that radicalization typically occurs offline, but there's no denying that the internet is a major communication channel for terrorist groups around the world. The Islamic State (ISIS) is thought to have hundreds of social media accounts, even doing recruiting...

Google Will Soon Backup Your Entire Computer

Google Will Soon Backup Your Entire Computer

Google pre-announced a new tool named "Backup and Sync," built on top of Google Drive, which will be able to back up files stored anywhere on the user's computer, not just in the Drive folder. The search giant says it will launch Backup and Sync in two weeks, on June 28. Google says the new tool is a mash-up of the old Google Drive app and the Google Photos desktop uploader. "Backup and Sync is...

WiFi Startup Eero Updates its Hardware, Launches New Network Security Service

WiFi Startup Eero Updates its Hardware, Launches New Network Security Service

Wireless networking startup Eero was founded on the premise of providing “WiFi that works.” Today the company is launching a new version of its flagship Eero wireless base station. The second-gen Eero is the same size and shape of its predecessor, but features triband WiFi — meaning it can broadcast on three wireless bands simultaneously — and is twice as powerful as the original Eero....

Read about the latest cyber security technology and trends

This category provides expertly curated cyber security news on the new cyber technologies as soon as they are revealed to the world. It is prudent for any organization to keep an eye on the latest cyber technologies, find the right one matching their needs and then implement and incorporate them into their cyber security infrastructure. Given the challenging nature of the cyber threats and threat actors, the organizations should continuously evaluate their cyber defense systems against the threats and keep looking out for technologies that would help them improve it. The cyber security students and enthusiasts should never miss any information on the new IT security technologies that are shaping the future of cyberspace. The news articles published under this category also list out the latest cyber security technology trends. This news published here will help inculcate the foremost awareness level in the domain of cyber security technology.