Cybersecurity in the Wake of a Reported Social Networking Breach

By Chris DeProfio on Jan 19, 2021 9:15:00 AM

As if being ostracized by big-tech hosting and supporting services was not enough of a controversy for a large and rapidly growing social networking provider, allegations recently surfaced that the provider’s user data was leaked. Reports indicate that before Amazon removed the provider from its hosting service, an Austrian hacker claimed to have accessed users’ image and video files that were uploaded to the website, along with the associated metadata. Regardless of whether this information was obtained from publicly posted materials or from a hack, the issue reinforces the need to regard data security as a top application priority.

Continue Reading

Embedded Software and Cybersecurity

By Abdul Dremali on Sep 23, 2019 9:05:00 AM

In 2015, cybersecurity researchers Charlie Miller and Chris Valasek demonstrated that a Jeep Cherokee could be hacked and its critical systems commandeered over the internet. They were able to completely disable the vehicle in one scenario; later they showed how they could arbitrarily control the vehicle’s acceleration, steering, and braking. Chrysler recalled 1.4 million of the vehicles to patch the exposed vulnerabilities, at great expense (and embarrassment) to the company.

Continue Reading

    See more resources

    Lists by Topic

    see all

    Get in touch

    LET’S BUILD SOMETHING AWESOME. TOGETHER.