Please turn on your JavaScript for this page to function normally.
SanDisk releases 64GB wireless flash drive

SanDisk announced the 64GB SanDisk Connect Wireless Flash Drive. In addition, recently released software updates enhance the performance and functionality of both the SanDisk …

Seagate’s 2TB external hard drive now backs up your phone

Seagate today announced the second generation of its sleek external storage lineup, Seagate Backup Plus Slim. This new offering includes the backup software, Seagate …

D-Link releases DIY surveillance solution

D-Link today expanded its line of IP surveillance solutions with the new mydlink Network Video Recorder with HDMI output (DNR-312L), providing a DIY surveillance solution for …

Wirelessly expand your iPad to 1TB

LaCie announced Fuel: a go-anywhere wireless hard drive for iPad, iPhone and Mac. Without requiring Internet access, the LaCie Fuel adds 1TB of external storage capacity to …

Critical backdoor in Linksys and Netgear routers found

A backdoor in some Linksys and Netgear wireless routers that allows malicious users to reset the devices’ configuration to factory settings and, therefore, to default …

BYOD and biometrics in the enterprise – ally or enemy?

BYOD continues its victory march as the enabler of choice among employees juggling increasingly intertwined home and work lives – for IT managers however it is the stuff …

Researchers demonstrate SD memory card hacking

Security researchers Andrew “bunnie” Huang and Sean “xobs” Cross have demonstrated that the only way to be absolutely sure that no one will be able to …

MacBook webcam indicator light can be disabled to aid spying

Two researchers from Johns Hopkins University have proved, without a doubt, that it is possible to activate internal iSight webcams included in some legacy Apple machines …

Building an OATH-compliant authentication server for less than $100

Using a Raspberry Pi nanocomputer and the multiOTP open source library, André Liechti showcases how to how to create an OATH-compliant authentication server at PasswordsCon …

Tales of passwords, cyber-criminals and daily used devices

Specific embedded devices are targeted by criminals in order to gain access or utilize for further attacks. Modems are attacked to change DNS-servers for advertising or …

FreeBSD ditches suspect hardware-based crypto

Buried in the “Security” section of a report on the FreeBSD Developer Summit held in September in Malta is a small but important note about the FreeBSD …

Inadequate electronic disposal protocols can lead to security leaks

American IT departments’ decisions could inadvertently put organizations at risk of an information security breach if they don’t have sufficient protocols for the …

Don't miss

Cybersecurity news