NYU Researchers Use Decoy Bugs to Bolster Software Security

When cyber criminals try to illicitly gain access to software programs, they typically start by looking for bugs that can be exploited to accept malicious inputs. These vulnerabilities act as hidden back doors that allow hackers to harvest user data, launch denial of service attacks and more. But what if hackers had to wade through… Read more »

Android 9 Pie Arrives With a Host of New Features

Google began rolling out the latest version of its mobile OS on Pixel phones this week, and users are finally getting a taste of Android Pie’s potential. Android Pie offers a number of significant improvements over the last iteration of Android, including new privacy features and adaptive performance optimizations that are powered by Google’s DeepMind… Read more »

Achieve 508 Compliance With Software Accessibility Testing

In 1998, President Clinton signed an amendment to the Rehabilitation Act of 1973 which “requires federal agencies to make their electronic and information technology (EIT) accessible to people with disabilities.” Today, this amendment is commonly referred to as Section 508. The accessibility guidelines established by Section 508 don’t just apply to federal agencies; any private… Read more »