Researchers demystify centralization in cryptocurrency mining

Blockchain technology has been considered as the most revolutionizing invention since the internet. Due to its immutable nature and the associated security and privacy benefits, it has attracted the attention of banks, governments, ...

Legal ramifications of anti-hacker honeypots

In the context of information technology, IT, a "honeypot" is an attractive online destination usually established to attract malicious third parties who then, assuming they have reached a valuable resource unwittingly reveal ...

Bypassing popular passwords

Every year computer security companies share their findings regarding passwords and data breaches. Again and again, they warn computer users to use complex passwords and not to use the same passwords for different accounts. ...

Ransomware 'hero' pleads guilty to US hacking charges

A British computer security researcher once hailed as a "hero" for helping stem a ransomware outbreak and later accused of creating malware to attack the banking system said Friday he pleaded guilty to US criminal charges.

5G presents security challenge for telecom operators

While Washington's concerns that future 5G wireless networks could be vulnerable to spying by China have dominated headlines, businesses have long been pushing to make sure the technology is as secure as possible.

page 3 from 40