Security researcher Seth Wahle of APA Wireless and Rod Soto of Hack Miami used a near-field communications (NFC) chip implant in his hand to demonstrate that it is possible to exploit Android devices and avoid detection by common body scanners located at airports and high-security environments.
Cisco’s Security Team has spotted in the wild a new Point-of-Sale malware dubbed PoSeidon that is more sophisticated than any previously detected PoS malware.
Cutely named malware packages connected to the Animal Farm group.
Quantum secure authentication has the potential to improve the security of computers, and could help create secure processors for artificial intelligence.
Sex toy hacking gives a new meaning to “penetration testing”.
A security researcher demonstrated that “car hacking” is reality through the exploitation of vulnerable Car Insurance Dongle. Millions of vehicles at risk.
In this phase it is quite impossible to attribute precisely the development of the Regin malware to a specific category of threat actors.
I have contacted one of the most popular security researchers in the world, Raoul Chiesa, who is President, Head of Information Superiority for MoD Unit at Security Brokers and advisor to several Institutions, including UNICRI, ENISA and member of the board of Directors for ISECOM, CLUSIT, OPSI-AIP.
Operations Onymous, 81% of Tor Users De-anonymized, Rogue Tor Node Spreads Malware
Kaspersky revealed that a crew of criminals dubbed Darkhotel targets executives traveling across Asia through hotel internet networks.
The Touch ID fingerprint reader on the new iPhone 6 can be fooled by the same trick that was working with iPhone 5S.