Please turn on your JavaScript for this page to function normally.
London
IoT creates new set of risks, orgs embrace active defense

If the past 12 months saw a dramatic increase in data breach activity, then the year ahead promises to bring an entirely new set of concerns – and a shift in how companies are …

Ethical connected car hacking service launched

A new security service developed to test the exposure of connected vehicles to cyber-attacks and help all market players develop security solutions has been launched by …

Car hacking made cheaper and easier

Fiddling with your car’s innards will soon become easier and cheaper than ever before, as Eric Evenchick has created and made available hardware and software design …

Smart Nest thermostat easily turned into spying device

At this year’s edition of the Black Hat security conference, a group of researchers has shown how extremely easy is to hack into the smart thermostats manufactured by …

Researchers discover critical flaws in the Chip and PIN system

A group of researchers from Cambridge University have discovered two critical flaws in the “Chip and PIN” (EMV) smart card payment system that can be misused to …

IoT security requirements will reshape enterprise IT security programs

The power of objects in the Internet of Things (IoT) to change the state of environments — in addition to generating information — will cause chief information security …

Researcher says traffic control systems can be hacked

Hacking control systems that regulate traffic lights in United States’ big, gridlocked cities is not only possible in action films, but in reality as well, says Cesar …

Target announces move to chip-and-PIN card technology

Target has announced that, effective May 5, Bob DeRodes will lead the company’s information technology transformation in the wake of the massive breach it recently …

The security of embedded devices

Embedded devices are everywhere and they make our lives more convenient, but from a security standpoint, they can be intimidating, especially if we’re talking about an …

Cyber threats organisations will deal with in 2014

The threat landscape is constantly evolving, and it’s an enterprise’s job and duty to keep up with the changes and do the best it can to protect its data, …

Researchers hack femtocells, record mobile phones’ calls, SMS traffic

Intercepting voice calls, SMS messages, and web traffic coming and going from a target’s mobile phone may be as simple as waiting for his phone to associate to a …

Hijacking connected cars with a $25 tool

A presentation by two Spanish researchers scheduled to take place later this month at the Black Hat conference in Las Vegas will apparently prove that hijacking modern cars …

Don't miss

Cybersecurity news