Lab Manager | Run Your Lab Like a Business

information security

How Can Brain Activity Identify Cybersecurity Threats?

by Iowa State University
The old adage that a chain is only as strong as its weakest link certainly applies to the risk organizations face in defending against cybersecurity threats. Employees pose a danger that can be just as damaging as a hacker.    

Researchers Uncover iOS Security Weaknesses

Researchers from the Georgia Tech Information Security Center (GTISC) have discovered two security weaknesses that permit installation of malware onto Apple mobile devices using seemingly innocuous applications and peripherals, uncovering significant security threats to the iOS platform.