Science fiction technology may not be as far off as we believe. The Internet of Things (IoT) uses the powerful combination of Wi-Fi and cloud technology to send information and perform actions through devices with Internet capabilities. This advance stems from the use of telemetry, decades-old machine-to-machine communication via wired sensors and transmitters. Now the […]
The WannaCry ransomware attack from this May made the whole world think about cyber security issues once again. Another unique point for WannaCry versus previous cyber attacks is IoT also got involved with the crisis as well. We learned from the news reports that this worm virus was different from usual. It had not only tried to […]
Ten years ago you didn’t have to worry about someone hacking your refrigerator. Today, your personal home assistant is quite literally listening to your every move. Experts believe that in just a few years, there will be over 20 billion devices connected to the internet with the possibility of being compromised by an attacker due […]
We live in a cyber-vulnerable world – a world governed by data. Data encapsulates almost every aspect of our personal and public life. It is heavily shared, distributed, stored and accessed, and it is constantly at risk. Recent mega-hacks, such as the ones on Target, Yahoo, and Ashley Madison, among others, demonstrate that leaking of […]
Robots are still an uncommon sight in the home, but most tech analysts project a huge increase in the amount of droids deployed to do tasks in the next ten years. It might not be that long before helper robots, picture C3P0 from Star Wars or a Mr. Handy from Fallout, are handling everything from […]
Recorded messages spoken to teddy bears could be the latest target for hackers, according to a report from security researcher Troy Hunt. CloudPets toys, the maker of electronic stuffed animals, left the personal information available for anyone to see. This included details of the child and recorded messages. See Also: Smart cities will soon buzz […]
When you think of car hacking, it’s easy to simply think of it as a nefarious activity when in reality it’s just as likely to be the work of a researcher or DIY enthusiast wanting to extend a vehicle’s capabilities and understand its weaknesses. Last year we saw Chinese security researchers take remote control of […]
Every day, there seems to be another advancement in medicine or medical research. While medical treatments increase the longevity and quality of life, the way that health is monitored is changing. The increasing popularity of wearable devices and health apps enables people to get greater insight into their health than ever before as wearable devices […]
It’s been a bad period for Canada’s Standard Innovation Corp., with the news that their popular connected “pleasure device” (aka a vibrator…now everyone settle down), We Vibe 4 Plus, is easily hackable being followed by a corresponding lawsuit. The smart vibrator released two years ago is marketed towards couples spending time apart. It’s Bluetooth- and […]
We live in a society where human health is increasingly enhanced by artificial augmentation and implantation including hip replacements and hearing aids. French company Carmat have been working for 15 years on the artificial heart, a device that completely replaces the human heart in people with end stage heart disease and a life expectancy of […]
An overwhelming majority of business leaders said that the adoption of Industrial Internet of Things (IIoT) is critical to their company’s future success, but only a quarter of them are deploying the technology today. In the survey, released by Genpact Research Institute, it said data security was the most prominent reason why IIoT deployments were […]
A new cybersecurity bill pushed by Michigan Senators Ken Horn and Mike Kowall will send car hackers to jail for life, if it manages to pass through the Senate. Senate Bill 927 and 928 detail the type of crime, punishment, and felony. Near the bottom, the bill states that “a person shall not intentionally access […]
In the second part of our interview with Covisint’s David Miller, he predicts how long it will be until we see a fully autonomous car and ponders new potential ransomware hacks for your ride.
Medium is the latest to put ye olde password in the crosshairs.
It’s easy! Not.
Those password-strength meters are often misleading.
It might be swimming in your sensitive data.
Or at least to shrink it down and drown it in a bathtub.
Hacker’s List matches hackers with those who want something hacked.
It’s supposed to guard against cyberintrusion. Remember?