We’ve been saying this for many years: This year’s cyberattacks dwarfed last year’s. And in this regard, 2016 was no exception. From online fraud to account takeovers and data breaches, and everything else, attacks were dished out in bigger sizes and higher frequencies than before.
Some trends such as ransomware and DDoS attacks dominated the headlines, but that was not all 2016 had in stock. While experts might differ on which were the biggest hacks of the year, there’s no denying that the following four cases were really unprecedented in their own kind. Continue reading
By David Niki, Comelite IT Solutions
Chatbots are the buzzword du jour and are slated to replace service apps and websites, some believe. While it’s too early to lean make such extreme assumptions, there are intuitive ways bots can be used right now, and a proper usage can have significant impact in app development and reduce production costs.
In this article we are sharing the experience we gained during development of Universal Chat; a bot ecosystem based on Telegram’s Bot API, as well as Facebook Messenger, Skype and Slack—Universal utilizes them all. Continue reading
I love Twitter, have been using it for years, and my Twitter account is much more active than my LinkedIn or Facebook. I use it regularly to share my latest articles with my followers, share links to other scoops and articles that are worth reading, post amusing comments on others’ posts, or simply vent my frustration when a particularly complicated article is giving me a hard time.
But Twitter gets frustrating as soon as exchanges start to get technical and lengthy in nature. And my latest episode happened yesterday, after VentureBeat ran my latest article, which explored the intersection of blockchain and cybersecurity. Continue reading
By Bryn Farnsworth, iMotions
That’s been the question that has been asked by psychologists and market researchers for decades, and the answer has reliably come from eye tracking technology. Now, as more and more of the devices that we use—from our phone to our car—seek to understand how we interact with the world, eye tracking is being used more than ever.
There are a lot of things happening right now as you look at this screen: Your eyes are tracking the words, and maybe they’re searching for the header, or furtively glancing at the sidebar. This kind of information is critical to market researchers and businesses, who strive to understand how users make decisions (and which of those decisions leads to a purchase). Continue reading
By Gary Southwell, Seceon
The insider threat has become one of today’s most pressing cyber security concerns. In 2016, the Insider Threat Report Spotlight found seventy-four percent of organizations feel vulnerable to insider threats—a dramatic year-over-year increase. However, less than half of all organizations (42 percent) have the appropriate controls in place to prevent an insider attack. The survey also provides greater insight on the source of the threats: “Privileged users, such as managers with access to sensitive information, pose the biggest insider threat to organizations (60 percent). This is followed by contractors and consultants (57 percent), and regular employees (51 percent).” Continue reading
In a controversial Friday 13th scoop, The Guardian unveiled a backdoor in WhatsApp, the popular messaging app owned by Facebook that has over 1 billion users and touts having unbreakable security.
Within a few hours of the Guardian report, the claim was debunked by other outlets, including this detailed piece in Gizmodo. While it is now clear that the backdoor is actually not a backdoor but a natural functionality of the messaging app, here’s what you need to know and what you can do to protect yourself from potential security mishaps. Continue reading
Our increasingly connected and digital lives are making us more vulnerable to cyberattacks than ever. As was the case in previous years, 2016 saw a spate of cyberattacks of unprecedented proportions. Some of these incidents were a reminder that the internet is no longer fun and games.
What we also learned was that the current infrastructure that powers our current local and global networks might no longer be able to sustain the new generation of attacks and threats.
Enter the blockchain, the distributed ledger that underlies the popular and controversial Bitcoin cryptocurrency, the technology that is the result of decades of research in cybersecurity and cryptography. Continue reading