Nearly three-quarters of all Internet of Things devices are susceptible to getting hacked or compromised, according to a recent study. The study, released by Hewlett-Packard (HP), examined 10 common smart devices, including thermostats, smart TVs and webcams. Each device had approximately 25 vulnerabilities.
Rogue cellular towers and phony base stations long have been a tradition of researchers at Black Hat and DEF CON, who test and demonstrate how they can intercept or manipulate cellphones, but a team of researchers has found a deeper problem of major security vulnerabilities in the client control software running on the majority of mobile phones around the world.
A study from Webroot on security and PC gamers details the security perspective of players on their gaming systems. The study indicates that many gamers either disable their security or remove it altogether, thereby sacrificing protection to maximize system performance and leaving themselves vulnerable to gaming-focused malware and cyber attacks.
From exposing the espionage ring that hacked the Dalai Lama to uncovering the commercial spyware being sold to repressive regimes, Citizen Lab has played a pioneering role in combing the Internet to illuminate covert landscapes of global surveillance and censorship. At the same time, it's also taken the role of an ambassador, connecting the Internet's various stakeholders from governments to security engineers and civil rights activists.
The same tools that help millions of Americans work from home are being exploited by cyber criminals to break into the computer networks of retailers like Target and Neiman Marcus.
Researchers at Dell SecureWorks have uncovered what they believe to be a Chinese hacking group specifically focused on stealing source code from video game companies, either in order to crack or cheat at particular games or to use in competing products.
Gathering and understanding cyber intelligence is the work of BlackForest, a new open source intelligence gathering system developed by information security specialists at the Georgia Tech Research Institute (GTRI). By using such information to create a threat picture, BlackForest helps corporations, government agencies and nonprofit organizations battle increasingly-sophisticated threats to their networks.
A key to reducing cyber crime is getting victims — often major corporations — to cooperate with authorities, two top federal law enforcement officials said during visits to Pittsburgh.
Officials with the Tor privacy service have uncovered an attack that may have revealed identifying information or other clues of people operating or accessing anonymous websites and other services over a five-month span beginning in February.
Cyber criminals have been launching DDoS attacks from Amazon cloud-based bots after gaining access via a known vulnerability in open source search engine Elasticsearch, according to researchers.
If you’re making a phone call with your iPhone, you used to have two options: Accept the notion that any wiretapper, hacker or spook can listen in on your conversations, or pay for pricey voice encryption software. As of today there’s a third option.
In an interview with former National Security Agency Director General Keith Alexander, Foreign Policy's Shane Harris learned that Alexander plans to file “at least” nine patent applications — “and possibly more" — pertaining to technology for detecting network intruders.
While the word “forensics” might conjure up images of collecting hair or fingerprints from crime scenes, the scope of forensic science extends beyond the physical into almost any realm. If you need to discover the weather patterns in the past, you need some forensic meteorology. Forensic accounting uncovers book-cookery. And down in Australia, they're working on forensic text comparison in order to catch pedophiles.
High-level Chinese hackers recently tried to break into a key Canadian computer system, forcing Ottawa to isolate it from the main government network, a senior official said on Tuesday.
Federal Chief Information Security Officers (CISOs) and information security executives face a number of challenges in today's dynamic, fast-paced environment. These challenges include advanced persistent threats, system vulnerabilities, and regulatory compliance, to name a few.