A hacker has developed a device that is capable of hacking into most modern cars by bypassing the rolling code security system.
Archives - August 2015
This year at Black Hat, the focus was as much on hacking the intersections of data as on a specific computer platform.
An alarming number of computers in the Welsh National Health Service (NHS) are running Windows XP. Is that really an appropriate level of security for computers that could be holding patients' medical information?
Blackhat grew! Not only did the hacker types leave their mom’s basement and get jobs, some even were forced to start explaining security to the CEO. A few succeeded in this new role, but enough to convince the execs that if something bad happens in IT, it happens to the execs shortly thereafter.
Windows 10 offers more personalisation and integration than ever before. We take a look at the privacy implications of this.
Wordpress has announced its latest update, urging all users to download version 4.2.4 immediately.
Hackers are using a commercially available VPN network in China to obscure the origin source of their activities.
Senior research fellow Righard J. Zwienenberg on why the Internet of Things could be *the* key security issue for the foreseeable future.
This article looks at the core idea behind applying ISO 27001.
Hacker sends woman images of herself and her boyfriend, which were captured through their own webcam.
Hackers have exploited a zero-day vulnerability in the latest version of Apple’s OS X.
Indiana's Attorney General has launched an investigation into a data breach at Medical Informatics Engineering, which has affected up to 4 million people.
It's not all about crashing cars and hacking guns: what's hot at Black Hat 2015 USA (#BHUSA) and how to get the most from the event.
From finding flaws to suggesting innovative security measures for the future, we look at some of the biggest bug bounty payouts in recent years.
Recent aggressive hacks on companies underline the need for good risk analysis, situational awareness, and incident response. Just ask AshleyMadison, Hacking Team, and Sony Pictures.