Please turn on your JavaScript for this page to function normally.
Hacking a smart lightbulb system

The phenomenon of the Internet of Things (IoT) is positively influencing our lives by augmenting our spaces with intelligent and connected devices. Examples of these devices …

Fortinet expands secure application delivery product portfolio

Fortinet announced new additions to its secure application delivery product portfolio that are a result of the company’s acquisitions of Coyote Point Systems and XDN. …

Self-encrypted 2.5″ SATA SSD from Microsemi

Microsemi announced a secure, half-terabyte SSD for mobile video surveillance operations, SANs and other high capacity storage applications requiring superior real-time data …

HackShield bags prevent physical and digital intrusion

Das Keyboard launched highly secure, radio frequency blocking bags. Known as HackShield bags, the company’s one-of-a-kind backpack and messenger bags empower …

nPulse updates its flow and packet capture appliance

nPulse released a new version of its Capture Probe eXtreme (CPX) flow and packet capture appliance, which provides a packet indexing solution at 30 million packets per second. …

Hijacking ships and planes with cheap GPS spoofers and laptops

After demonstrating a successful GPS spoofing attack against a drone (UAV – unmanned aerial vehicle) last June, Cockrell School of Engineering Assistant Professor Todd …

The scary implications of Google Glass

Google Glass, for all its promise, has some scary implications. Here is my list of potential challenges we face with Glass: User experience Social awkwardness Privacy (or lack …

Video: Hackers for hire

Hackers are the 21st century warriors who worry many. As everything we use becomes increasingly connected, so their opportunities to hack, divert or destroy increase. NATO …

Solera Networks enhances advanced threat protection

Solera Networks introduced the Blue Coat ThreatBLADES, making it possible for enterprises to protect against and resolve advanced targeted attacks. ThreatBLADES unify threat …

SIM encryption flaw opens 500M users to attack

A flaw in the encryption technology used by some SIM cards can allow attackers to make the target phone download malicious apps and even effectively clone a user’s card …

New ReadyNAS rackmount devices from NETGEAR

NETGEAR announced ReadyNAS 3220 and ReadyNAS 4220, the latest NAS products to run on the ReadyNAS OS, introduced in March 2013. Available in 2U rackmount form with 12-bay …

Apricorn unveils FIPS 140-2 encrypted USB 3.0 drive

Apricorn debuted its Aegis Padlock Fortress, a secure drive designed specifically for the stringent requirements of the Government, Military and Healthcare. The first USB 3.0 …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools