Security Week 36: jailbreak theft, farewell to RC4 and holes in routers
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
1438 articles
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
Headlines raise alarm: the greatest hack in history finally reached iOS. Is that really so and who are the potential victims?
The rulebook for freethinking people: how not to get made the next time you log on Ashley Madison or buy goods in a sex shop online.
They teach a lot of things in schools, but they never tell you how to be safe in Internet. We have several simple advices on cybersecurity for you, that will help you stay away from trouble.
Infosec digest: exploit kit Neutrino in Wordpress, yet another GitHub DDoS, Wyndham responsible for breach, while Target is not.
A year ago, an infamous leak which exposed some celebrities’ nude photos sparked the discussion around password safety. What can you do protect your accounts?
“The Girl in the Spider’s Web”, the 4th book of Millenium series released today. Our security expert David Jacoby tells how he consulted the author of the book on what exactly hacking is.
In-flight security made quite a lot of headlines this summer, but this time at unusual angle: the one quite surprising for an average passenger and quite expected for an IT specialist.
One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.
Just think of the sticky fingers of banks, marketers and insurers that hunt for your personal data with revolting impudence and store them unsecured. So, what’s the fuss about?
Once more into a breach: 9.7 gigabytes of stolen data with users’ emails, credit card transactions and profiles leaked into the darknet.
Since there’s nothing unhackable in this world, why should chemical plants should be the exception?
In this post there are two seemingly unrelated pieces of news which nevertheless have one thing in common: not that somewhere someone is vulnerable, but that vulnerability sometimes arises from reluctance to take available security measures.
Don’t be a slowpoke, follow Dr. House’s rule: everybody lies, especially on the Internet.
The 2016 editions of the Kaspersky Lab product suite have enhanced privacy options for the company’s customers.
Three most important recent news with extensive commentary and trolling: nasty Android Stagefright vulnerability, new car hacks and Do Not Track 2.0 privacy initiative
Predictability of human beings can barely be overestimated when it comes to passwords. But what about lock screen patterns, are we predictable as well when we’re creating them?
Researchers compete at finding security holes in infotainment systems of connected cars and breaking in. The new case proves that Tesla does care a lot about security at wheel.
Security researcher Chris Rock discovered, that it’s very easy to kill a human. All you need is just a computer with Internet access, some knowledge and common sense.
Recently we wrote about the Jeep Cherokee hack incident. At Black Hat security researchers Charlie Miller and Chris Valasek finally explained, how exactly the now-famous Jeep hack happened.
History, tradition, passion and belonging to the world of motorsport. The 24 hours of SPA was all that and so much more