air-gapped
Hack air-gapped computers using heat
Ben-Gurion University of the Negev (BGU) researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way …
Equation Group: Cyber espionage, compromising HDD firmware, sophisticated malware
For several years, the Kaspersky Lab Global Research and Analysis Team (GReAT) has been monitoring more than 60 advanced threat actors responsible for cyber-attacks worldwide. …
Researchers create inexpensive versions of NSA’s spying tools
ShmooCon, the hacker convention that welcomes individuals interested in all aspects of computer and information security, was held last week in Washington, D.C. Among the …
Extracting data from air-gapped computers via mobile phones
A group of researchers from the Department of Information Systems Engineering at Ben-Gurion University in Israel have demonstrated and detailed a technique that can allow …
Top 10 technologies for information security in 2014
Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2014. “Enterprises are dedicating increasing …
Six ways to improve SCADA security
Industrial control systems (ICS), distributed control systems (DCS), supervisory control and data acquisition systems (SCADA) have all been around for decades, but thanks to …
Featured news
Sponsored
Don't miss
- Cheap ransomware for sale on dark web marketplaces is changing the way hackers operate
- Who owns customer identity?
- Enterprises face significant losses from mobile fraud
- Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation
- Thinking outside the code: How the hacker mindset drives innovation