Get a Pentest and security assessment of your IT network.

Cyber Security

Attackers to Exploit Search Personalization, Supply Chains

Georgia Tech released Emerging Cyber Threats Report 2013 [PDF], a report released ahead of yesterday s Georgia Tech Cyber Security Summit 2012. Report: Algorithms designed to personalize online search results will give attackers the ability to influence the information available to their victims in the coming years. Researchers, in turn, must seek ways to fortify these systems against malicious manipulation. The report also explores the dangers of supply chain security, a growing concern in an increasingly global economy. Mobile security is generally good in the U.S., but poor patch management among certain vendors could present problems moving forward.

Source: https://threatpost.com/attackers-exploit-search-personalization-supply-chains-111512/77219/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security