Researchers continue hacking cars, and start on heavy vehicles
When Charlie Miller and Chris Valasek demonstrated a year ago how they can remotely exploit vulnerabilities in Chrysler’s 2014 Jeep Cherokee, and fiddle with its wipers, …
When Charlie Miller and Chris Valasek demonstrated a year ago how they can remotely exploit vulnerabilities in Chrysler’s 2014 Jeep Cherokee, and fiddle with its wipers, …
Have you ever wondered what kind of malicious offerings can be found on dark web “hacker markets,” who sells them and how widely they are available? Three …
A zero-day flaw in the popular password manager LastPass can be triggered by users visiting a malicious site, allowing attackers to compromise the users’s account and …
In a period spanning 72 days, two researchers from Northeastern University have discovered at least 110 “misbehaving” and potentially malicious hidden services …
Are you willing to sacrifice a dozen or so of your files in order to save the rest from the grasping hands of modern crypto-ransomware? I believe that the answer from most …
A group of researchers from Nanyang Technological University, Singapore, have created a novel solution for large-scale Android malware detection. It’s called DroidOL, …
With the ubiquity of web and cloud-based software applications, not only are they essential tools to interconnect enterprises with their customers and prospects, but they are …
How do cybersecurity experts discover how to properly defend a system or build a network that’s secure? As in other domains of science, this process involves hypothesis, …
According to recent research from Kaspersky Lab and B2B International, nearly half (48 per cent) of the companies surveyed believe they know the identity and motivation of …