In defense of the IoT: First-hand experience
Credit to Author: Jeffrey Esposito| Date: Tue, 27 Mar 2018 13:00:08 +0000
The day I turned home network defender and stopped making fun of IoT developers.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Jeffrey Esposito| Date: Tue, 27 Mar 2018 13:00:08 +0000
The day I turned home network defender and stopped making fun of IoT developers.
Read MoreCredit to Author: Nikolay Pankov| Date: Mon, 26 Mar 2018 15:54:34 +0000
Even if you are really not an interesting target for an APT actor, you can still be used in a malware delivery chain
Read MoreCredit to Author: Julia Glazova| Date: Mon, 26 Mar 2018 13:00:37 +0000
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.
Read MoreCredit to Author: Sergey Lurye| Date: Fri, 23 Mar 2018 16:16:00 +0000
Those 50 million Facebook profiles were already harvested
Read MoreCredit to Author: Daniel Olivares| Date: Thu, 22 Mar 2018 15:40:08 +0000
There are simply not enough skilled professionals to meet everyone’s security needs
Read MoreCredit to Author: Jeffrey Esposito| Date: Thu, 22 Mar 2018 14:38:09 +0000
In this podcast, Jeff and Dave discuss the Facebook and Cambridge Analytica debacle, hackers making bomb threats, and more.
Read MoreCredit to Author: Alex Perekalin| Date: Wed, 21 Mar 2018 13:00:48 +0000
Almost every new smartphone now lets you unlock it with your face — and that’s really bad for security.
Read MoreCredit to Author: Serge Malenkovich| Date: Tue, 20 Mar 2018 15:10:22 +0000
At this year’s Security Analyst Summit, Inbar Raz revealed how he managed to crack a cafe chain’s loyalty card system, a taxi service, and an airport
Read More