Please turn on your JavaScript for this page to function normally.
Wirelessly expand your iPad to 1TB

LaCie announced Fuel: a go-anywhere wireless hard drive for iPad, iPhone and Mac. Without requiring Internet access, the LaCie Fuel adds 1TB of external storage capacity to …

Critical backdoor in Linksys and Netgear routers found

A backdoor in some Linksys and Netgear wireless routers that allows malicious users to reset the devices’ configuration to factory settings and, therefore, to default …

BYOD and biometrics in the enterprise – ally or enemy?

BYOD continues its victory march as the enabler of choice among employees juggling increasingly intertwined home and work lives – for IT managers however it is the stuff …

Researchers demonstrate SD memory card hacking

Security researchers Andrew “bunnie” Huang and Sean “xobs” Cross have demonstrated that the only way to be absolutely sure that no one will be able to …

MacBook webcam indicator light can be disabled to aid spying

Two researchers from Johns Hopkins University have proved, without a doubt, that it is possible to activate internal iSight webcams included in some legacy Apple machines …

Building an OATH-compliant authentication server for less than $100

Using a Raspberry Pi nanocomputer and the multiOTP open source library, André Liechti showcases how to how to create an OATH-compliant authentication server at PasswordsCon …

Tales of passwords, cyber-criminals and daily used devices

Specific embedded devices are targeted by criminals in order to gain access or utilize for further attacks. Modems are attacked to change DNS-servers for advertising or …

FreeBSD ditches suspect hardware-based crypto

Buried in the “Security” section of a report on the FreeBSD Developer Summit held in September in Malta is a small but important note about the FreeBSD …

Inadequate electronic disposal protocols can lead to security leaks

American IT departments’ decisions could inadvertently put organizations at risk of an information security breach if they don’t have sufficient protocols for the …

D-Link patches critical vulnerability in older routers

D-Link has released firmware patches for a number of its older routers sporting a critical authentication security bypass vulnerability discovered in October. The flaw was …

A new Linux worm targets the Internet of Things

A new Linux worm – luckily still not spotted being used in the wild – has been unearthed by Symantec researchers. Dubbed “Darlloz”, its targets are not …

Innovations that will shape network security

Headline after headline, some company reports a cyber incident and hangs its head in shame. While it is disappointing, strong businesses have strong leaders that show us how …

Don't miss

Cybersecurity news