home.aspx
 
EVENTS

International Cybersecurity Forum
INTERNATIONAL CYBERSECURITY FORUM
January 22-23, 2019
The International Cybersecurity Forum is a platform aiming at promoting a pan-european vision of cybersecurity as well as to strengthen the fight against cybercrime. In line with the digital single market and data protection regulation, the FIC became THE reference event, bringing together all major...

The Future of Cyber Security Manchester
THE FUTURE OF CYBER SECURITY MANCHESTER
January 24-24, 2019
Cyber security at the top of the agenda as the attack landscape widens. Cyber-attacks are diversifying, putting businesses at increasing risk. In 2017, multiple ransomware attacks such as the Wannacry cryptoworm that hit the NHS demanded bitcoins in exchange for the release of data. This is now evol...

Architecture Technology Corporation


Architecture Technology Corporation (ATCorp) is a software technology company engaged in research, development, engineering & services. ATCorp's software-intensive solutions provide our government & commercial clients with the flexibility to "customize" new, existing & legacy systems with features that meet or exceed their next generation requirements. The Research & Development (R&D) Divisions apply advanced engineering techniques & methodologies from the fields of wireless networking & network security, network protocol engineering, software engineering, software design, network design, ad hoc wireless networks, network security & software development, combined with expertise in C & C++ to meet our customer's demands for high-performance, high-reliability, real-time systems. R&D positions are available in Minneapolis, MN or Ithaca, NY.

RELATED NEWS


found numerous duplicate Twitter and LinkedIn accounts among Fortune 500 CEOs.  Every duplicate account represents a risk to an enterprise, and a potential launching pad for socially engineered attacks.  By using a trusted name, socially engineered attacks increase the likelihood of success.  A 2016 Ponemon research report, sponsored by BrandProtect, revealed “an astonishing 79% of security teams do not feel that they have processes in place to gain actionable intelligence a...
INFORMATIONSECURITYBUZZ.COM
READ MORE

The topic of cyber security has become a part of our national headlines. Terms such as WikiLeaks, hackers and leaked emails have become part of America’s lexicon. Former President Barack Obama said, “cyber threats are one of the most serious economic national security challenges that we face as a nation.”...
TIMESREPUBLICAN
READ MORE

Touchscreens and other components that are often replaced in smartphones and tablets can hide malicious chips capable of giving attackers complete control over the device, warned researchers at the Ben-Gurion University of the Negev. Researchers conducted their experiments on two Android devices: a Huawei Nexus 6P smartphone which uses a touchscreen controller from Synaptics, and an LG G Pad 7.0 tablet that uses an Atmel controller. However, the experts believe many other devices are also vulner...
SECURITY WEEK
READ MORE

The lack of any further information from the team behind TrueCrypt and the abruptness with which the service appears to have been end-of-lifed led some to suspect hackers may have hijacked the page in a bid to get users to download malware....
INFOSECURITY MAGAZINE
READ MORE

Adobe has issued security updates for Adobe Flash Player for Windows, macOS, Linux and Chrome OS after another active exploitation of a zero-day vulnerability in Adobe Flash via a Microsoft Office document was identified. The critical vulnerability (CVE-2018-15982) exists in the wild and could lead to arbitrary code execution and privilege escalation, according to the advisory. According to Gigamon’s applied threat research team, the vulnerability “allows for a maliciously crafted Fl...
INFOSECURITY MAGAZINE
READ MORE

Gartner said that, for now, the top three most sought-after cloud services moving forward will remain email security, web security services, and identity and access management (IAM). However, in 2014, the highest growth is forecast to occur in cloud-based tokenization and encryption, security information and event management (SIEM), vulnerability assessment and web application firewalls....
INFOSECURITY MAGAZINE
READ MORE

EVENTS

International Cybersecurity Forum
INTERNATIONAL CYBERSECURITY FORUM
January 22-23, 2019
The International Cybersecurity Forum is a platform aiming at promoting a pan-european vision of cybersecurity as well as to strengthen the fight against cybercrime. In line with the digital single market and data protection regulation, the FIC became THE reference event, bringing together all major...

The Future of Cyber Security Manchester
THE FUTURE OF CYBER SECURITY MANCHESTER
January 24-24, 2019
Cyber security at the top of the agenda as the attack landscape widens. Cyber-attacks are diversifying, putting businesses at increasing risk. In 2017, multiple ransomware attacks such as the Wannacry cryptoworm that hit the NHS demanded bitcoins in exchange for the release of data. This is now evol...