Legal, privacy, and security concerns about driverless cars
In the last five years, there has been a steady increase in the number of driverless cars. First, such cars were launched in the city of Phoenix (Arizona), followed by launches in San Francisco (California) and Los Angeles (California). The introduction of driverless cars is often accepted with a dose of skepticism. Below, we will examine some of the major issues raised by the opponents of...
Key findings from ESG’s Modern Application Development Security report
A deep dive into security issuesIn August 2020, the Enterprise Strategy Group (ESG) published its report, “Modern Application Development Security.” ESG is a company specialized in IT-related research. It provides market intelligence to companies all over the world. To compile its report, ESG surveyed 378 cybersecurity, application development and...
Octopus Scanner malware: What it is, how it works and how to prevent it | Malware spotlight
IntroductionOctopus Scanner appeared somewhere in 2018. Although its creators are still unknown, the operation of Octopus Scanner has been extensively discussed in numerous information security publications. This type of malware attacks repositories on the GitHub...
Business email compromise (BEC) scams level up: How to spot the most sophisticated BEC attacks
Introduction to BEC attacksThe term “business email compromise” (BEC) refers to the use of email fraud with the aim to accomplish malicious purposes. BEC attacks usually rely on the lack of information security awareness of the employees of the targeted...