Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security measures...
Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection-
A
Advanced Persistent Threat (APT) – An unauthorized person gaining...
Reading Time: 3 minutesWhy Is Computer Security So Hard?
On the Impossibility of Virus Detection
Professor Dave Evans teaches Computer Science at the University of...
Reading Time: 3 minutesIn 2003, Oxford University Philosophy Professor Nick Bostrom posed the following question: what if an artificial intelligence (AI)...
1 – Carnegie Mellon Receives $10 Million From K&L Gates To Study Ethical Issues Posed By Artificial IntelligenceCarnegie Mellon announced that it will dedicate a $10...
1 – Self-Driving Cars: Feds Release Long-Awaited RulesOn Tuesday, the federal government released its long-anticipated new rules for self-driving cars. In a press release,...
Reading Time: 2 minutesDDoS attacks (Distributed Denial of Service attacks) and the data breaches that accompany such attacks are of serious consequence; these...