Please turn on your JavaScript for this page to function normally.
Researchers demonstrate SD memory card hacking

Security researchers Andrew “bunnie” Huang and Sean “xobs” Cross have demonstrated that the only way to be absolutely sure that no one will be able to …

MacBook webcam indicator light can be disabled to aid spying

Two researchers from Johns Hopkins University have proved, without a doubt, that it is possible to activate internal iSight webcams included in some legacy Apple machines …

Building an OATH-compliant authentication server for less than $100

Using a Raspberry Pi nanocomputer and the multiOTP open source library, André Liechti showcases how to how to create an OATH-compliant authentication server at PasswordsCon …

Tales of passwords, cyber-criminals and daily used devices

Specific embedded devices are targeted by criminals in order to gain access or utilize for further attacks. Modems are attacked to change DNS-servers for advertising or …

FreeBSD ditches suspect hardware-based crypto

Buried in the “Security” section of a report on the FreeBSD Developer Summit held in September in Malta is a small but important note about the FreeBSD …

Inadequate electronic disposal protocols can lead to security leaks

American IT departments’ decisions could inadvertently put organizations at risk of an information security breach if they don’t have sufficient protocols for the …

D-Link patches critical vulnerability in older routers

D-Link has released firmware patches for a number of its older routers sporting a critical authentication security bypass vulnerability discovered in October. The flaw was …

A new Linux worm targets the Internet of Things

A new Linux worm – luckily still not spotted being used in the wild – has been unearthed by Symantec researchers. Dubbed “Darlloz”, its targets are not …

Innovations that will shape network security

Headline after headline, some company reports a cyber incident and hangs its head in shame. While it is disappointing, strong businesses have strong leaders that show us how …

Are tablets secure enough for business?

Amazon is launching its first enterprise-ready tablet. A smart move, as the much-loved mobile device can finally be integrated into business. However it does beg the question, …

Secure Dropbox data using a hardware security token

Intrinsic-ID released Saturnus, an application that enables enterprises to protect digital assets stored and shared on Dropbox. With Saturnus, files are encrypted before they …

Bogus PS4 and Xbox One giveaways popping up

Just in time for the upcoming holidays and gift-giving, Sony has released PlayStation 4 last week and Microsoft is set to release Xbox One next week. But online scammers are …

Don't miss

Cybersecurity news