The most famous traffic light ‘hack’ in history is in the classic film, The Italian Job (1969), where the heist involves paralyzing Turin via its traffic control system – but the reality is much easier.
America’s Nuclear Regulatory Commission was successfully attacked three times within the past hree years, by unknown attackers, some foreign – and largely using standard phishing emails.
One of England’s greatest-ever cricketers, Sir Ian Botham, appeared to have been the victim of a Twitter hack yesterday as an obscene picture unexpectedly appeared on the sportsman’s feed.
Blackphone, billed as a privacy tool to keep the puplic safe ruled the headlines when it was is hacked in five minutes, Meanwhile, Wi-Fi routers were also shown up – and Android users face a toothy new threat,
Biometrics are touted as a replacement for the passwords and PINs we all know and hate – and Intel’s new earbuds could be the most discreet way of authenticating a user ever.
Facebook’s new Messenger app has spared privacy concerns after a list of Permisssions appears to show the app could be taking video of users in secret, according to the Washington Post.
An aircraft security expert has eased the worries of a lot of frequent flyers this week — by reassuring them that aircraft are not “hackable” in mid flight. The claim was made at Black Hat last week.
With Black Hat 2014 in full swing in Las Vegas, it was never going to be a quiet week – but revelations about FBI malware and a trove of a billion passwords inspired furious debate too.
Yet another “connected” device was outed as a potential spy this week – as researchers showed how Google’s Nest thermostat could be turned into a “fully-fledged spying device”.
Today’s fashion for high-end electronics in luxury hotels allowed a hacker to wreak havoc in 200 suites at once in a five-star hotel in China – switching off lights, changing the TV channel, raising blinds and fiddling with the temperature.
For several years, FBI agents have been taking an unusual approach to detective work online – using malware against suspects who have not been proven guilty, just visited the wrong Tor site.
Cybercriminals are waging a game of ‘cat and mouse’ with corporations, well-armed with malware protection AV software but facing adversaries who scan constantly for weak points, according to the first quarterly report released by the UK’s new Computer Emergency Response Team.