A major security vulnerability study into modern cars has finally been released, two years after it was originally intended to be published.
Archives - August 2015
With children gradually going back to school in Latin American regions, it’s time to remind our children of the importance of IT security.
IRS admits that the data breach it experienced in May is far bigger than previously thought.
Phishing may well be one of the oldest online scams in the world, but it’s also one of the most effective and commonly deployed. Here’s what to be aware of.
The cybersecurity skills gap is a security problem and in the US the National Initiative For Cybersecurity Education (NICE) is seeking to reduce that gap.
Lenovo has announced that LSE,a virtually unremovable software, is no longer being installed on its products.
A new study shows that applications belonging to the BitTorrent family are vulnerable to DRDoS attacks.
Significant issues evident in Apple products have been patched with a raft of new updates.
Security researchers found a vulnerability in Android that could allow attackers to steal information from smartphones through remotely executed code via a crafted MMS. According to them up to 950 million devices could be vulnerable.
Is it time to revalue the role of anti-malware? Maybe, but uninformed or intentionally misleading mutterings about signatures are not where to start.
Don't be cyber-flashed by a pervert. Make sure that your iOS device's AirDrop settings are configured properly to protect your eyes from unpleasantness.
Internet Defense Prize goes to researchers from the Georgia Institute of Technology for designing a tool that detects a new class of C++ vulnerabilities.
Researchers have hacked into a Corvette with a simple text message, taking control over its brakes.
An international team of hackers and traders who benefited from illegal pre-publication access to company finance updates have been charged with fraud.
A data security loophole discovered in Facebook needs to be fixed, according to a software engineer.
There is a huge shortage of skilled professionals in cybersecurity. We take a look at five young geniuses who may be the future of the industry.
The recent Firefox attacks are an example of active in-the-wild exploitation of a serious software vulnerability.
Glasses that are capable of blocking facial recognition technology are to go on sale in Japan next year.
The Information Commissioner's Office is “making enquiries” into a major data breach at Carphone Warehouse in the UK.
If Black Hat is becoming the new RSA, then DEF CON is oozing toward Black Hat, it seems, and B-Sides is the new DEF CON. This year it got some Ikea furniture to spruce up its mom’s basement. Not totally commercial, but definitely more – first apartment folding furniture – chic; the basement just got upgraded.