5 pieces of tech from CES we hope stay secure
We all know that security is low on the IoT totem pole. However, here’s to hoping these 5 items stay secure.
182 articles
We all know that security is low on the IoT totem pole. However, here’s to hoping these 5 items stay secure.
Konstantin Goncharov recaps the most significant security events of 2015.
With Christmas less than a week away, it seems fitting that Hello Kitty is latest site geared at kids that has been hacked.
A system integrator discovered a virus lurking in a policeman’s body camera
VTech, a company that manufactures electronic learning devices, baby monitors, smart toys announced that information from 5 million customer accounts were accessed in an attack.
Kaspersky Security Analyst Summit is planned for next February. Among the highlights of SAS 2016 are trainings for the attending participants, with top Kaspersky Lab’s researchers and other security experts at the helm.
It’s believed, that we own GPS, Bluetooth, Wi-Fi and CDMA invention to Hedy Lamarr. Let’s find out if this is true and what exactly the actress contributed to the development of these technologies
In this edition of Security Week infosec digest we’ll cover threecases of companies being hacked and data being leaked and companies reacting on the incidents.
Infosec digest: exploit kit Neutrino in Wordpress, yet another GitHub DDoS, Wyndham responsible for breach, while Target is not.
One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.
I was repeatedly asked the question: “Once you decide to become a cyborg, how would your current routine change?” Today I’m going to give you 10 answers to this question.
Tech journalists Chris Brook and Brian Donohue discuss Google I/O, the IRS and Carefirst BlueCross BlueShield Data Breach in this Talk Security podcast.
At Google I/O 2015, the software giant presented a slew of new features and services. We take a first look at customizable app permissions, Android Pay, Now on Tap, and others.
While LTE networks are seemingly just now starting to take off, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s perspectives. What are those next-gen networks going to be and why do we need them at all?
The annual RSA Conference in San Francisco, California of Internet-of-things insecurity and how no amount of money can fix computer security
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it also helped to locate Bin Laden.
The word “IoT” (Internet of Things) has been a buzz word for several years now. It has become the era when more home electronics and cars are connected to the
The world of ubiquitous connected devices is almost here, and it’s so eagerly anticipated that it becoming a reality seems inevitable. Anticipation, however, doesn’t necessarily mean that we are going
The design of the current smartwatches is defined by being aimed at geeks. It looks like it will again take Apple to perform its duties carefully iSplaining wearables to ordinary people.
Let’s identify the main IT security and protection trends at MWC 2015.
The story of how a biochip was implanted into my hand and why I needed it.