Skip to Main Content

ESTEEMStream.News

Dr. Luther P. Jackson ESTEEM Center for Engineering and Technology

ESTEEMStream.News

ESTEEMStream.News

Rouge AI Agents Cause Risk for Cybersecurity Leaks

Rouge AI Agents Cause Risk for Cybersecurity Leaks

By: Sunny Daddio, Journalist
Recently AI agents have started to act autonomously which could cause trouble like data leaks or allow hackers to gain access to accounts, systems, or information. Hackers are already adept at gaining information so weak spots could be even more dangerous.
Read Story
black iphone 5 on yellow textile

Quantum Cryptography

By: Khue Vu, Journalist
Quantum cryptography is an emerging field that uses the principles of quantum mechanics to secure information and communication systems. Unlike traditional cryptography methods that rely on mathematical algorithms and computational complexity, quantum cryptography offers security based on the fundamental laws of physics, making it potentially unbreakable. As cyber threats become increasingly sophisticated, quantum cryptography becomes the next generation of data security.
Read Story
Google sign

Google Acquires Wizz

By: Zablon Worede, Journalist
Google has made a bold move by purchasing Wiz, a well-known cloud security company, for a staggering $32 billion. This is a big step for Google as it works to grow its influence in cloud computing. Wiz specializes in helping businesses keep their data safe across multiple cloud platforms, like Amazon Web Services and Microsoft Azure, which makes it a valuable addition to Google’s team.
Read Story
teal LED panel

Artificial Intelligence in Cybersecurity

By: Christian Jeon, Journalist
In the rapidly evolving world of technology, artificial intelligence has emerged as a game-changing force, and no area is this more evident than in the realm of cybersecurity.
Read Story
"Passwords are like Pants..." by Richard Parmiter is licensed under CC BY-NC-ND 2.0. To view a copy of this license, visit https://creativecommons.org/licenses/by-nd-nc/2.0/jp/?ref=openverse.

Choosing Good Passwords

By: Desmond Kraft, Journalist
To understand how to make a good password, first you have to understand what makes a bad password, and how hackers exploit that through a number of methods. Also be ready to take steps if your password is stolen. Know how to change it and take extra measures like using 2FA(2-factor authentication). The main thing is just make sure you don't give it to anyone you don't know in real life and don't put it into any shady sites.
Read Story
Source: Flickr "Cyber Security - Cyber Crime" by perspec_photo88 is licensed under CC BY-SA 2.0

Cyber Security Awareness Month – Six Cyber Security Tips

By: Julia Clavecillas, Reporter
October is Cyber Security Awareness month. Here are six tips to help you stay safe on the internet.
Read Story
Load More Stories
Activate Search
Dr. Luther P. Jackson ESTEEM Center for Engineering and Technology
#CyberSecurity