Tech news from MIST
Latest news from CyberManipal, that matters.
Page 6
RESEARCH AND DEVELOPMENT
UK universities awarded funding for research into IoT
3 years ago
A grant has been awarded to various British colleges to explore security issues encompassing Internet of Things (IoT). Reported on July 13, the 'PrivIoT' project driven by Dr. James Nicholson, a speaker at Northumbria University's Computer and Information Sciences office, will likewise include scholastics from Royal Holloway, Manchester, and Nottingham... Read more
A grant has been awarded to various British colleges to explore security issues encompassing Internet... Read more
BREACHES
Pandemic has resulted in a spike in data breach costs, says IBM
3 years ago
According to Ponemon Institute's 'The Cost of a Data Breach Report,' sponsored and analyzed by IBM security, data-breach expenses have increased over 10% in the last year. The research considers various costs linked to Data Breaches, including legal, operations of technology, customer loss, brand worth, and a lot more aspects.... Read more
According to Ponemon Institute's 'The Cost of a Data Breach Report,' sponsored and analyzed by... Read more
RESEARCH AND DEVELOPMENT
Easy Secure Photos algo to encrypt images on the cloud
3 years ago
Researchers at Columbia Engineering have developed a new technique called Easy Secure Photos (ESP) that encrypts photos uploaded to any cloud service like Google Photos or iCloud without making any changes to the services themselves. The encryption of photos on the cloud was a huge problem since most lcoud services... Read more
Researchers at Columbia Engineering have developed a new technique called Easy Secure Photos (ESP) that... Read more
POLICIES AND REGULATIONS
China imposes restrictions on zero-day vulnerability researchers
3 years ago
The Chinese government has mandated that any Chinese citizen who finds a zero-day vulnerability must pass the details to only the Chinese government and not to any third-party outside China. A zero-day vulnerability is a computer-software vulnerability unknown to those who work towards resolving those very bugs. Hence, until the... Read more
The Chinese government has mandated that any Chinese citizen who finds a zero-day vulnerability must... Read more
BREACHES
Chain-reaction ransomware attack on the Fourth of July
3 years ago
Ransomware criminals broke into networks and sow malware that cripples networks, affecting financial services, travel, leisure, and the public agencies in at least 17 countries, including the United Kingdom, South Africa, Canada, Argentina, Mexico, Indonesia, New Zealand and Kenya. This attack was claimed by an affiliate of Russia's notorious REvil... Read more
Ransomware criminals broke into networks and sow malware that cripples networks, affecting financial services, travel,... Read more
BREACHES
LinkedIn suffers data breach of 700 Million users
3 years ago
LinkedIn experienced another massive data breach this year that exposed data of over 700 million users, thus compromising the data of more than 92 percent of its users. The new dataset obtained by an unknown hacker is said to consist of personal details of LinkedIn users, including phone numbers, physical... Read more
LinkedIn experienced another massive data breach this year that exposed data of over 700 million... Read more
VULNERABILITIES
Hidden Linux RPM bug discovered after decades
3 years ago
Red Hat has used RPM for software package distribution for decades with no prior known bugs or vulnerability. Now, they have learned the existence of a hidden security bug that has been active since its creation. However, a repair patch has been submitted as soon as it was discovered. ... Read more
Red Hat has used RPM for software package distribution for decades with no prior known... Read more
RESEARCH AND DEVELOPMENT
Web source code NFT sold at $5.4m
3 years ago
NFTs are certificates of ownership for digital assets, with most of them not having a physical representation. They do not necessarily include copyright control and hence it is regarded as a get-rich-quick scheme by critics. Recently the World Wide Web creator Sir Tim Berners-Lee sold the NFT in an auction... Read more
NFTs are certificates of ownership for digital assets, with most of them not having a... Read more
RESEARCH AND DEVELOPMENT
161-year-old Maths problem solved by Hyderabad based physicist
3 years ago
The 161 one-year-old mathematical problem which lacked its proof just got confirmation. After been declared as the Millennium Prize problem two decades ago, a Hyderabad-based mathematical physicist, Kumar Eswaran, claimed to have found the proof for the Riemann Hypothesis. Riemann hypothesis, in number theory, hypothesis by German mathematician Bernhard Riemann concerning... Read more
The 161 one-year-old mathematical problem which lacked its proof just got confirmation. After been declared... Read more
VULNERABILITIES
Bounty worth Rs 22 Lakh for a bug in Azure cloud systems
3 years ago
Bug bounty hunters are cybersecurity professionals or researchers who explore the web and find and fix bugs. They scan systems searching for vulnerabilities or flaws that hackers might use to sneak in and inform the companies about them. Aditi Singh, a 20-year-old ethical hacker from Delhi, is one such bounty... Read more
Bug bounty hunters are cybersecurity professionals or researchers who explore the web and find and... Read more