
Can you hack a train?
The modern rail system is basically a network of hundreds of different, but interconnected computers. Are these systems flawless security-wise?
146 articles
The modern rail system is basically a network of hundreds of different, but interconnected computers. Are these systems flawless security-wise?
“Good-faith” car hacking and mobile device “jailbreaking” are now on their way to becoming legal in the U.S. The Library of Congress’ triennial exemptions to the anti-circumvention rules within the Digital Copyright Millennium Act (DCMA), released on October 27th.
We interview Russia’s youngest grand master. He reveals the story of falling in love with chess, the strategy and the tactics of the game, and plans for the future.
Konstantin Goncharov explains the bottom line of tech giants’ epic fails in the new edition of cybersecurity news digest.
In this edition of Security Week infosec digest we’ll cover threecases of companies being hacked and data being leaked and companies reacting on the incidents.
What is the difference between real and theoretical threats?
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
Our today’s weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.
In the new installment of our explosive hit series “Infosec news” you’ll find: the breach of Bugzilla, Carbanak is coming back and Turla uses Level-God hard to track techniques to hide servers.
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
Infosec digest: exploit kit Neutrino in Wordpress, yet another GitHub DDoS, Wyndham responsible for breach, while Target is not.
One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.
A look at what the “threat landscape” is comprised of for businesses.
In this post there are two seemingly unrelated pieces of news which nevertheless have one thing in common: not that somewhere someone is vulnerable, but that vulnerability sometimes arises from reluctance to take available security measures.
Three most important recent news with extensive commentary and trolling: nasty Android Stagefright vulnerability, new car hacks and Do Not Track 2.0 privacy initiative
Is it still correct to use the term “antivirus?” Cybersecurity today is much more than just antiviruses; still essential, but alone it is no longer enough.
It’s up to the manufacturers to change the approach to designing modern hi-tech equipment. As we have written before, security should come first. It must be taken in account at the design level, not added later.
Kaspersky Lab has discovered an advanced attack on its own internal network and is sharing its investigation results. TL;DR – Customers are safe; neither products nor services have been compromised.
Mid-April in Singapore was pretty hot not only because of tropical climate, but also because of INTERPOL World – a huge conference/exhibition organized by INTERPOL to give security product vendors
The word “IoT” (Internet of Things) has been a buzz word for several years now. It has become the era when more home electronics and cars are connected to the
Cyberbullying is one of the unpleasant effects of hyper-socialization that the Internet as a whole – and social networks in particular – bring us. Learn how to protect your children from it.