To hackers’ delight, merchant vessels that transfer about ninety percent of the world's cargo heavily depend on automation and remote monitoring systems with poor IT security.
Recent report by US GAO was treated by medias as “Modern aircrafts can be hacked and commandeered through onboard Wi-Fi”. Is it really that bad?
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it also helped to locate Bin Laden.
Fraudsters hacked Skype and tricked people from a contact list to send them about $5,000 over the course of a few days. Skype support, local banks and the police refused to do any...
A Trojan malware called Podec uses popular Russian social network VKontakte, and other channels, to infect Android phones. Beware: It can bypass CAPTCHA.
A malware that cannot be wiped from the victim’s hard drive does exist. However, it’s so rare and expensive, that you probably won’t ever encounter it.
The top privacy data leaks in 2014 include: data breaches at Target and Home Depot, hacks of JP Morgan and Barclays banks, and leaks at Orange and Dropbox.
Researcher discovers that Progressive Snapshot tools lack any real security controls and could be exploited by attackers to hack cars.
We have constructed a list of promises that you should make to yourself this year to stay safe both online and offline.
For the second time in three years, Sony is the main character in a massive and humiliating cyberattack.