Please turn on your JavaScript for this page to function normally.
Hack air-gapped computers using heat

Ben-Gurion University of the Negev (BGU) researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way …

Equation Group: Cyber espionage, compromising HDD firmware, sophisticated malware

For several years, the Kaspersky Lab Global Research and Analysis Team (GReAT) has been monitoring more than 60 advanced threat actors responsible for cyber-attacks worldwide. …

Researchers create inexpensive versions of NSA’s spying tools

ShmooCon, the hacker convention that welcomes individuals interested in all aspects of computer and information security, was held last week in Washington, D.C. Among the …

Extracting data from air-gapped computers via mobile phones

A group of researchers from the Department of Information Systems Engineering at Ben-Gurion University in Israel have demonstrated and detailed a technique that can allow …

Top 10 technologies for information security in 2014

Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2014. “Enterprises are dedicating increasing …

Six ways to improve SCADA security

Industrial control systems (ICS), distributed control systems (DCS), supervisory control and data acquisition systems (SCADA) have all been around for decades, but thanks to …

Don't miss

Cybersecurity news