MIT experts are urging the Trump administration to take cybersecurity more seriously. According to the experts, electric grids, oil pipelines, and other critical infrastructure in the U.S. pose huge hacking risks, but are widely ignored. “The digital systems that control critical infrastructure in the United States and most other countries are easily penetrated and architecturally … continue reading
The world of Internet-connected devices targeted at children is a magical one. Toy dinosaurs can learn and communicate with a growing child, teddy bears can transmit messages overseas to military parents, and talking dolls can communicate with children via speech recognition software. But this connectedness comes with a price. Recent hacks on IoT toys are … continue reading
Security, specifically application security, has become a huge challenge for IT companies worldwide. Actually, most companies in any vertical nowadays have some sort of IT platform they maintain. An increasing number of exploits, causing widespread financial and technical damage, are being reported on an almost daily basis. Yet the biggest vulnerability you have is sitting … continue reading
Google DeepMind is pinning artificial intelligent agents against each other to see how they cooperate. To research this, the team is using a game known as Prisoner’s Dilemma to test its willingness to compete and cooperate. According to the research, at times the agents worked peacefully together, but were less cooperative in complex situations or … continue reading
Developers and testing professionals want to speed up deployment times, but bugs are holding them back, according to a new report. Sauce Labs has released “Testing Trends in 2017: A Survey of Software Professionals,” which examined trends in web and mobile apps. The report revealed that 28% of respondents want to deploy hourly, but no … continue reading
Google sent out an e-mail late last week letting people know that ClojureScript, the Clojure compiler that emits JavaScript source code, has a feature release that includes externs inference and comprehensive JavaScript module support. The release includes externs inference, which “should greatly ease the integration of third-party JavaScript libraries incompatible with Google Clojure advanced compilation,” … continue reading
The HummingBad malware is back with a new variant, named “HummingWhale,” which has been found in more than 20 apps on Google Play. The malware-infected apps were downloaded several million times by users, and researchers from security company Check Point discovered the malware and notified the Google security team about the apps, which have since … continue reading
Microsoft has announced it is open-sourcing its unit test execution infrastructure: the VSTest platform. The framework is designed to run tests, collect diagnostic data, and report the results. It provides the ability to run different test frameworks, provides code coverage, includes test impact analysis, and more, according to Microsoft. In addition, it can parallelize across … continue reading
Developers and businesses face many problems when trying to ensure the security of their IoT devices. According to a new report, consumers are at the heart of those IoT security problems. Ubuntu released a survey of 2,000 consumers to understand how they handle their connected devices. The report revealed that 31% of consumers update their … continue reading
Yahoo has been hacked, again. The company Wednesday disclosed that a newly discovered data breach had exposed the private information of more than one billion Yahoo users. It is believed that this breach is separate from the breach disclosed this September, where 500 million accounts were jeopardized. Regardless, the news means Yahoo has been the … continue reading
For years the FIDO Alliance has been dedicated to changing and improving online authentication. FIDO, which stands for Fast Identity Online, envisions a future where online security methods go beyond passwords and provide stronger authentication solutions such as biometrics and second-factor solutions. Google recently did a two-year research study on FIDO’s approach to examine how … continue reading
It’s the holiday season, and retailers are watching their online sales climb. Business may be booming for these companies, but shoppers beware: 100% of these retailers have issues with domain security, according to SecurityScorecard’s “2016 Biggest Holiday Retailers Cybersecurity Report.” When it comes to cybersecurity, retailers have a lot to worry about, especially since these … continue reading