Expert corner

 
 
CISSP Planning Kit
IoT

The dangers that come with buying pre-owned IoT devices

When you buy a second-hand connected car, can you be sure that it is not still not reachable by its former owner? Similarly, when you sell your own connected car, how can you be sure that it will not leak the personal information you fed it to …

Eye

How IDF soldiers’ phones got turned into spying devices

For many months now, an unknown threat actor has been tricking servicemen in the Israel Defense Forces (IDF) into installing Android spyware. Israeli media says that the threat actor is likely Hamas, but Lookout researchers aren’t so sure. …

Don't miss

Malware news

RSA Conference 2017 news

 
CISSP Planning Kit