Thieves don’t need your car keys, just a wireless signal

A recent study by researchers at the University of Padova reveals that despite the rise in car thefts involving Remote Keyless Entry (RKE) systems, the auto industry has made little progress in strengthening security. Since RKE’s introduction in the ea… Continue reading Thieves don’t need your car keys, just a wireless signal

AI is changing cybersecurity roles, and entry-level jobs are at risk

Will humans remain essential in cybersecurity, or is AI set to take over? According to Wipro, many CISOs are leveraging AI to improve threat detection and response times and to build enhanced incident response capabilities. What’s changing AI systems c… Continue reading AI is changing cybersecurity roles, and entry-level jobs are at risk

Free AI coding security rules now available on GitHub

Developers are turning to AI coding assistants to save time and speed up their work. But these tools can also introduce security risks if they suggest flawed or unsafe code. To help address that, Secure Code Warrior has released a new set of free AI Se… Continue reading Free AI coding security rules now available on GitHub

CURBy: A quantum random number generator you can verify

NIST and the University of Colorado Boulder have created a public service that delivers random numbers using quantum mechanics. Called the Colorado University Randomness Beacon (CURBy), the system offers a daily stream of certifiable random numbers gen… Continue reading CURBy: A quantum random number generator you can verify

Virtual kidnapping scams prey on our worst fears

Getting a call saying a family member has been kidnapped is terrifying. Fear and panic take over, making it hard to think clearly. That’s exactly what criminals count on when they use a scam called virtual kidnapping. What is virtual kidnapping? It’s e… Continue reading Virtual kidnapping scams prey on our worst fears

19 ways to build zero trust: NIST offers practical implementation guide

The National Institute of Standards and Technology (NIST) has released a new guide that offers practical help for building zero trust architectures (ZTA). The guidance, titled Implementing a Zero Trust Architecture (SP 1800‑35), includes 19 example set… Continue reading 19 ways to build zero trust: NIST offers practical implementation guide

The path to better cybersecurity isn’t more data, it’s less noise

In cybersecurity, there’s an urge to collect as much data as possible. Logs, alerts, metrics, everything. But more data doesn’t necessarily translate to better security. SOCs deal with tens of thousands of alerts every day. It’s more … Continue reading The path to better cybersecurity isn’t more data, it’s less noise