It's almost as though the criminal hackers will be soon able to read your mind. And new research suggests that maybe they will be...
Hi, what are you looking for?
It's almost as though the criminal hackers will be soon able to read your mind. And new research suggests that maybe they will be...
At the 3rd Usenix Workshop of Health Security and Privacy in Bellevue, Washington, last week, researchers focused their attention on medical devices, and not...
When Public Relations Departments Do Cybercrime Research A recent article on ProPublica dissected two commonly quoted figures about cybersecurity: $1 Trillion in losses due...
Using technology to steal high-tech cars is not new. In my book, When Gadgets Betray Us, I use the example of Radko Soucek, a...
Researchers Using the Doppler Effect to Sense GesturesBuilding on its success with the XBox Kinect, which uses motion to influence the actions of a...
What do Sex Surveys and Cybercrime Surveys Have in Common?Cybercrime is either getting worse or getting better. According to a recent report from Microsoft's...
In Australia, the local police will be informing businesses and residents that their wireless signal is unprotected and therefore open for criminal activity.According to...
Ford Testing Firmware Update Program, Encourages Customers to Have a Unique USB for Each Ford They OwnThis month, Ford is borrowing something from the...
The security of device-independent quantum key distribution (QKD) has been deemed ineffective by a team of Canadian researchers, and at least one commercial product...
State of the art teleconferencing equipment is a must for most organizations today but few have installed it correctly, according to researchers at Rapid...
In a talk at the 28th Chaos Communication Congress (28C3) entitled “Smart Hacking For Privacy,” researchers Dario Carluccio and Stephan Brinkhaus described their experiences...
Next year you'll be able to do all your holiday shopping without ever opening a physical wallet—or so Google hopes. The previously announced Google...
Sometime around the beginning of November, thieves managed to insert an additional circuit board into the self checkout Point of Sale (POS) machines Lucky’s...
About 200 customers of the Central Maine Power Company recently noticed something odd after the utility installed smart meters in their homes: in some...
Privacy Implications of Powerline Electromagnetic Interference from Televisions
Last week, Duqu, the next-step toward the next-generation Stuxnet, was revealed by researchers, although its pedigree and the intended target remains the subject of...
Hacking Electronic Voting Machines via Man-in-the-Middle Attacks
Vendors That Don't Test Products Before Selling Them are Doomed to be Targets of Future Research and Attacks
The mobile industry needs to work together at pushing timely updates to Android users. The real question is motivation.With more and more mobile malware...
Thinking Beyond Traditional Cyber Attacks: Are We Prepared for the Boom of Internet Connected Devices?