Week in review
Week in review: Tools for detecting Hacking Team spyware, vulnerable Smart Home Hubs, and the most sophisticated Android malware ever exposed
Week in review: Tools for detecting Hacking Team spyware, vulnerable Smart Home Hubs, and the most sophisticated Android malware ever exposedHere’s an overview of some …
Week in review: Emergency patches for actively exploited flaws, HTML5 can be used to hide malware
Here’s an overview of some of last week’s most interesting news, reviews and articles:First Java zero-day in two years exploited by Pawn Storm hackersThe flaw was …
Week in review: HackingTeam breach and consequences, and Android games unmasked as phishing tools
Here’s an overview of some of last week’s most interesting news and articles:Hacking Team hacked, 400GB+ of company documents and emails leakedHacking Team, the …
Week in review: Popular VPNs leaking data, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles:5 ways to stop the Internet of Things from becoming the Internet of ThievesThis is the …
Week in review: TLS security, malicious Tor exit nodes, how to find a free, secure proxy service
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles:Penetration Testing With Raspberry PiRaspberry Pi is a small and …
Week in review: Rethinking security, LastPass breach, and stronger data protection rules for Europe
Here’s an overview of some of last week’s most interesting news, podcasts and articles:How data-centric security worksIn this podcast recorded at Infosecurity …
Week in review: Windows 10 security, developing honeypots, IoT security holes
Here’s an overview of some of last week’s most interesting news, podcasts and articles:Brain’s reaction to certain words could replace passwordsYou might not …
Week in review: Hiding exploit code in images, online summer travel scams, and Infosecurity Europe 2015
Here’s an overview of some of last week’s most interesting news and articles:Cookie warnings: Useless and bad for security?Our daily clicking away of these …
Week in review: Drone detection, crypto wars, and tracking wearable tech
Here’s an overview of some of last week’s most interesting news and articles:Sniffing and tracking wearable tech and smartphonesResearchers at Context Information …
Week in review: Logjam bug, trojanized PuTTY, and the importance of encryption and key management
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles:European Internet users urged to protect themselves against …
Week in review: VENOM bug, infosec and ethics, and flawed crypto endangers smart grid devices
Here’s an overview of some of last week’s most interesting news, podcasts and articles:IoT and the great data heistWith the introduction of new mobile devices in …
Week in review: Illegal surveillance, WordPress insecurity, cheap computer kill switch
Here’s an overview of some of last week’s most interesting news, podcasts and articles:Securing the smart grid: European Network of Cyber SecurityDr. Klaus Kursawe …