Very few data breaches have garnered as much attention recently as the Starwood/Marriott breach in which up to 500 million records may have been accessed by an unauthorized user. It’s suspected that the encryption keys that protected personally identifiable information (PII), specifically payment card data, were also compromised. Much has been written about what is […]
The Obama Administration is looking to make sure the type of cyberattack that took major websites — like Spotify, Netflix, and Twitter — offline last week does not happen again. The Department of Homeland Security (DHS) will develop a set of “strategic principles” for connected devices, to ensure they meet security standards and don’t fall […]
Chinese webcam manufacturer Xiongmai has issued a recall of around 10,000 compromised webcams, which were linked to a serious U.S. cyberattack last week. The attack rendered major websites like Spotify and Twitter offline for hours. It took security experts a few days to figure out exactly what happened, as this is a new type of […]
The Internet of Things (IoT) has the opportunity to reinvent how we visualize the internet, but it also comes with a variety of challenges, including the threat of hackers devastating lives or destroying a business’s assets. This chaotic future may already be upon us, according to researchers at Incapsula. The DDoS protection provider showed a […]
Motion data that your wearable collects from accelerometers, gyroscopes, and magnetometers could be used to break into your bank account or any other keypad lock, according to a paper co-authored by the Stevens Institute of Technology and the Thomas J. Watson School of Engineering and Applied Science at Binghamton University. Researchers were able to develop an […]
Researchers at Pen Test Partners have wirelessly hacked the Mitsubishi Outlander Hybrid SUV, allowing them to take control of the vehicle’s electric charging and even turn off the alarm system. In a five minute video, security researcher Ken Munro demonstrates how easy it is for a potential hacker to take control into the system and […]
Infamous black hat and Internet troll Andrew Auernheimer is up to his usual tricks, this time exploiting thousands of unsecure internet-connected printers and forcing them to spew out racist propaganda flyers. He discovered that printers with port 9100 exposed can print anything you want, after you add a small postscript file to the port. After […]
After a quarter century of RSA security conferences, conference founder Kurt Stammberger sees them finally coming into their own just as public awareness grows
How some tools and a little know-how can make your home more interesting.
Seems like Google is definitely poking the bear here.
No official support? No problem.
Not the holiday miracle we want, but the holiday miracle we need.
The epically hacked company blusters on as its internal documents circulate.
The most obvious suspect may be the culprit after all.
Forget proprietary code; now vanity languages are the lock-in threat.
This is not an easy attack.
Horse is gone; barn door now closing.
Some helpful tips.
And test your app while doing so.
Big companies like Apple, Facebook and Google are developing their own programming languages, forcing developers to adapt.