ALL


  The Risks of Prioritizing Features Over Security in China's EV Industry

In recent years, China's electric vehicle (EV) industry has seen a surge in innovation and growth. Companies like BYD, NIO, XPeng, and Xiaomi have become household names, not just in China but globally. These companies have been at the forefront of integrating cutting-edge technology into their vehicles, often promoting new features such as autonomous driving, advanced infotainment systems, and seamless connectivity. However, this rapid pace of innovation has raised concerns about whether these companies are placing enough emphasis on security.The Allure of New FeaturesChinese EV makers have b...

7 0       SECURITY CHINA EV CAR


  bcrypt: Safeguarding Passwords with Strong Hashing and Adaptive Security

IntroductionIn today's digital world, passwords play a crucial role in protecting personal privacy and information security. Passwords are the most commonly used means of authentication because they are simple yet effective. Password security is the cornerstone of cybersecurity and plays a fundamental role in safeguarding the information security of individuals and organizations. However, with the increasing frequency and complexity of cyberattacks, traditional password hashing algorithms like MD5 and SHA series have proven to be inadequate against modern security threats. Therefore, using str...

4,102 0       SECURITY BCRYPT


  Simplify Cloud Data Security: A Deep Dive Into Protecting Sensitive Data in Java

Featuring encryption, anonymization, hashing, and access controlNetwork security incidents occur now and then, mostly caused by data leakage. Data security has aroused widespread concern, and the community keeps working hard on approaches to simplify data security, especially in sensitive data protection.Sensitive data includes but is not limited to personally identifiable information (PII) like names, ID numbers, passport numbers, driver’s license numbers, contact information like addresses, phone numbers, account credentials like usernames, passwords, PINs, and financial information li...

1,053 0       JAVA SECURITY ENCRYPTION DECRYPTION TOKENIZATION


  Public Vs. Private Cryptocurrency Keys

Before investing in any form of cryptocurrency, you must become familiar with the terminology used in the industry. This will prevent mistakes that could jeopardize your entire investment, and no one should be investing in any type of security or asset that they don't fully understand first.Crypto WalletsBefore we even delve into what public and private keys are, we first need to discuss what the keys are for. Your Bitcoin or crypto wallet is basically the account that you store your cryptocurrencies in after purchase. It is entirely controlled by you, and this level of control means that unfo...

1,329 0       SECURITY CRYPTOCURRENCY


  Uber’s audio recording plan in Brazil and Mexico

Uber has recently come out with a plan to introduce a new feature to its App in Brazil and Mexico. The feature will record the conversations between the driver and the passenger, with their consent. But consent here is a bit tricky.Basically, if the driver decides to turn on the recording feature, they are not obligated to warn the passenger and vice versa. Once the recording has been made and submitted to support for some kind of violation, neither of the two parties will have the ability to view it ever again.It will be solely reviewed by Uber’s support team or handed over to the ...

1,208 0       UBER PRIVACY SECURITY VOICE RECORDING APP NEW FEATURE


  Essential Rules To Protect Your Credit Card When Shopping Online

You have to protect yourself and your credit card online while shopping. There are a number of ways to do this, but some prove more technical than others.Your basic best defense includes sensible use and layers of protection. The best way to do this is to pick and choose which stores at which you charge purchases. You can reduce the chance of losing your card details to a thief by declining to allow the retailer to store your credit card. Use a password manager to save your passwords and make a different password for each store account.Do not shop in public. If someone can see your screen, the...

859 0       MASTERCARD CREDIT CARD SECURITY


  Implementing DESede/ECB/NoPadding cipher algorithm in GoLang

By default, GoLang doesn't provide the ECB mode cipher for DESede though there is CBC mode provided. In cases we need to encrypt/decrypt data with ECB mode, we need to implement those by ourselves. This mode is frequently used when encrypting/decrypting PIN block which is small block data less than 16 bytes.In this post, we will introduce how to implement the DESede/ECB/NoPadding algorithm in GoLang by using the existing cipher support. Here we will not cover how DESede works in detail, instead we will just cover the logic to make it work.Below is the sample code which can be used to encrypt/d...

8,318 0       GOLANG SAMPLE SECURITY DES DESEDE 3DES


  Top 3 Cybersecurity Trends to Watch Out for Today

One trend in cybersecurity that never changes is that it’s getting more important with every passing year. According to statistics, the number of cyberattacks and severity of the losses they incur are growing at an alarming rate. Every day about 24,000 of malicious mobile apps get blocked yet more pop up overnight. For a business today cybersecurity isn’t an option, it’s a necessary measure one needs to invest in heavily. And it’s essential to follow the trends and developments in this industry to stay on top of the latest changes.3 Cybersecurity Trends You Should Keep ...

964 0       CYBER SECURITY SECURITY