News & Highlights Archive
News & Highlights
(Source: RCR Wireless News) The malware NotPetya began as an Ukranian tax software update to MeDoc, a popular accounting software in the country. The attack spread to thousands of … The leaked data
Read More
News & Highlights
(Source: Livemint) According to Akhilesh Tuteja, partner and head-risk consulting, KPMG in India, and co-leader – global cyber security, KPMG, said, “Cybercrime has moved from corporate espionage and theft of
Read More
News & Highlights
(Source: Android Kenya) When they receive this info, the experts at Google try to edit the OS’ source code files in order to seal the security holes discovered in the OS
Read More
News & Highlights
(Source: MilTech) The research report, titled “Global Security Application Software Market Report 2022,” offers an unmistakable understanding of the topic. The exploration report tries to appreciate the leading-edge techniques taken by vendors in
Read More
News & Highlights
(Source: BleepingComputer) As new security vulnerabilities and exploits are released daily, debug features that can be exploited should not be left in software released for production. If manufacturers need debugging tool to perform
Read More
News & Highlights
(Source: Forbes) Essentially, it is the ability for software and hardware (the machine) to emulate the thinking and decision making we do as humans, especially the learn-as-you-go part. As Steve Dyer
Read More
News & Highlights
(Source: Market Realist) Google is launching an AI training course in which it aims to expand competence in machine learning. Among other areas, Google’s AI course would teach softwaredevelopers how
Read More
News & Highlights
(Source:PR Newswire) LIMERICK, Ireland, Dec. 15, 2017 /PRNewswire/ — Embedded Downloads, the developers of the world’s first Blockchain phone, the BitVault® announced a strategic market alliance with D’Vast
Read More
News & Highlights
(Source: Data Center Knowledge) Juniper, a silicon valley-based networking company known for its routers, switches, network management software, and network security products, got the Contrail software through its purchase of the eponymous company in
Read More
News & Highlights
(Source: Ars Technica) It’s possible Microsoft has a process in place for ensuring the security of third-party apps that get installed on Windows 10 machines and that somehow the Keeper vulnerability
Read More