Computer scientists address gap in messaging privacy Researchers have developed a solution to a longstanding problem in the field of end-to-end encryption, a technique that ensures that only sender and recipient can read a message. With current end-to-end encryption, if…
Can Internet of Things be the New Frontier for Cyber Extortion?
Did you know that despite being equipped with new applications and hardware, most Internet of Things (IoT) devices are furnished with outdated connection protocols and operating systems (OS)? (this is good) When exploited, it can open up the device to remote access by hackers.…