The adoption of smart technology to power city services could leave urban areas “wide open” to being hacked on a mass scale, says a cybersecurity expert.
What’s the difference between IDS, firewalls and antivirus? This guide should explain how they complement each other in a balanced security setup.
A security expert has had a computer chip designed for tracking cows implanted into his hand by an ‘unlicensed amateur’ to hack phones from underneath the skin, reports Gizmodo.
Reporting from Interop 2015, Las Vegas, where it’s all about the connectivity and the massive leaps forward in network capacity and speed, but security concerns are also in the mix.
Today, ESET researchers reveal a family of Linux malware that stayed under the radar for more than 5 years. We have named this family Linux/Mumblehard. A white paper about this threat is available for download on WeLiveSecuriy.
OFAC will soon be enforcing economic and trade sanctions against individuals and groups outside the United States that use cyber attacks to threaten U.S. foreign policy, national security or economic stability.
What kind of punishment best fits a convicted hacker? Jail time for serious computer crimes is almost a certainty, but for one ex-hacker, Higinio Ochoa, the terms of his parole also include being “banned from the internet”.
Two major hospitals in the United States are trialling a new system for detecting malware on medical devices, using probes that monitor AC power consumption to detect infections.
Hacktivists have launched a distributed denial-of-service attack against the website of TMT (Thirty Meter Telescope), which is planned to be the Northern hemisphere’s largest, most advanced optical telescope.
A major vendor of point-of-sale terminals has not changed the default passwords used on its devices in a quarter of a century, researchers have revealed at RSA 2015.
UK train services could be vulnerable to being hacked, hijacked and crashed, due to the trial of new digital signaling system designed to make lines safer.
Major themes of the 2015 RSA Conference: the degree to which the deployment of digital devices is outpacing our ability to deploy humans with the necessary skills and knowledge needed to secure data and systems.
A 26-year-old hacker who helped expose the rape of a teenage girl could spend five times longer in jail than the perpetrators he outed.
The Samsung Galaxy S5 and other ‘unnamed Android devices’ are vulnerable to having the fingerprints they use for authentication cloned by hackers, reports Gizmodo.