How to improve smart car apps

How to improve smart car apps

After conducting a thorough study of applications for connected cars, our experts highlighted a number of flaws of such software. Connected cars offer their users a lot of benefits, mainly related to additional information and remote control of vehicle functions....
Flexera an IBM-certified alternative for ILMT

Flexera an IBM-certified alternative for ILMT

Let’s face it, no matter the vendors involved, IT asset management (ITAM) is complex, expensive and time-intensive for enterprises. Flexera’s 2022 State of ITAM found that 83% of software asset management (SAM) teams’ time is spent toward audit activities, and the top...
Cybercrime: The Dangerous World of QR Codes

Cybercrime: The Dangerous World of QR Codes

QR codes are everywhere these days. People use them to open websites, download apps, collect loyalty points, make payments and transfer money. This is very convenient for people, but of course there is a catch: Cybercriminals also try to cash in and have already...
An Analysis of Dangerous Curves

An Analysis of Dangerous Curves

Some recently exposed vulnerabilities in cryptographic software highlight an old problem. Software often fails when in “exotic and rarely used configurations.” The recently-published CVE-2022-0778 vulnerability, and the related CVE-2020-0601 vulnerability, both...
The Importance of Automation in Data Classification

The Importance of Automation in Data Classification

It’s no surprise to anyone that the amount of data that exists is rapidly growing. A report by IDC predicts that by 2025, the global datasphere will have grown to 175 zettabyes. To put in perspective how much data this truly is, one zettabyte is equal to one trillion...