Tag: acm

Filling of Gender Gap in Cyber Security Sector

While the pandemic led to an exponential increase in remote working and more attempts for hackers to exploit systems, it inadvertently led to an increased need for cyber security analysts. ‘People are starting to understand the role of cyber security…

Remote Workers Battle Home-Working Security

As employees have been working from home for the past year, there have been an increase in the rate at which organizations witness malware attacks in remote devices. The coronavirus pandemic has resulted in more remote working than ever before…

Drones Can Now Detect The Coronavirus From The Sky

While other regions are getting used to the new normal: face masks, hand sanitizers, temperature checks, Alabama is getting used to the presence of drones. The Alabama State Senate recently adopted the Draganfly Smart Vital System, a screening system that…

The Eye of Venice is on Every Tourist

In the past few years, in the canal city of Venice also known as La Serenissima, or The Most Serene, things have become less serene, as a result of the 30 million visitors who visit the city of just 50,000…

Java Dips While Python Rules

Software-checking business Tiobe has ranked Python as the best programming language of 2020 because it became popular in its index than another language over the year. Tiobe uses programming-related queries on search engines to compute its rankings which saw Python…

Will We Be Able to Control Superintelligent Machines?

While great advances are being made in Artificial Intelligence (AI), some scientists have forewarned us of the risks of a super-intelligent AI that may be difficult to control. Making use of theoretical calculations, an international team of researchers, inclusive of…

Debate on Plans For AI in 2021

Artificial Intelligence developed greatly in the 2010s as a result of advances in deep learning― a category of AI which collects, stores and processes large quantities of data. In a lecture delivered by Prof Celestine Iwendi at ACM, he emphasized…

Backdoor in Zyxel Devices. Make Sure You’re Patched

Recently, a backdoor built into Zyxel device models was discovered and is being exploited by hackers. These device models are used by multitudes of people as VPNs, firewalls and wireless access points. According to a researcher from a Netherlands-based security…