What happens when one healthcare company owns the transaction that is responsible for drug pricing transparency nationwide? Parts 1 and 2 of this series explore questionable prescription drug pricing ...
Reverse engineering and tampering attacks threaten every mobile app, yet many apps apply basic code hardening techniques (or none at all!) to defend against these attempts. In fact, research has shown ...
In the wake of this Cambridge Analytica affair, we are once again confronted with the reality of just how much information we leak to the world, how much data companies generate about us, and how far ...
Given enough computer power, desire, brains and some luck, the security of most systems can be broken. But there are cryptographic and algorithmic security techniques, ideas and concepts out there ...
It's no secret that cyber threats are everywhere and growing stronger all the time. Any credible cybersecurity effort relies on active threat intelligence to examine vulnerabilities and bolster ...
As a graduate student at the Massachusetts Institute of Technology in 1996, Amit Sahai was fascinated by the strange notion of a “zero-knowledge” proof, a type of mathematical protocol for convincing ...