A German researcher known as Starbug has demonstrated that it is possible to extract a smartphone PIN code from a selfie image.
Cisco’s Security Team has spotted in the wild a new Point-of-Sale malware dubbed PoSeidon that is more sophisticated than any previously detected PoS malware.
Onion.City the new search engine specialized for the black markets in the Deep Web simply accessible from a common browser.
Sex toy hacking gives a new meaning to “penetration testing”.
The single most famous application of quantum computers is in code-breaking.
Pizza Hut knows what you really want — “the world’s first subconscious menu.”
In this phase it is quite impossible to attribute precisely the development of the Regin malware to a specific category of threat actors.
I have contacted one of the most popular security researchers in the world, Raoul Chiesa, who is President, Head of Information Superiority for MoD Unit at Security Brokers and advisor to several Institutions, including UNICRI, ENISA and member of the board of Directors for ISECOM, CLUSIT, OPSI-AIP.
Operations Onymous, 81% of Tor Users De-anonymized, Rogue Tor Node Spreads Malware
The Touch ID fingerprint reader on the new iPhone 6 can be fooled by the same trick that was working with iPhone 5S.
Julian Assange’s 2014 book When Google Met WikiLeaks consists of essays authored by Assange and, more significantly, the transcript of a discussion between Assange and Google’s Eric Schmidt and Jared Cohen.