False alerts about floods, radiation levels are just some of the ways attackers can abuse weakly protected IoT devices, researchers warn. Earlier this year, many residents in Hawaii were...
Read moreThe Enigma of AI & Cybersecurity
August 11 2018We’ve only seen the beginning of what artificial intelligence can do for information security. Alan Turing is famous for several reasons, one of which is that he cracked the...
Read moreThe Enigma of AI & Cybersecurity
August 11 2018We’ve only seen the beginning of what artificial intelligence can do for information security. Alan Turing is famous for several reasons, one of which is that he cracked the...
Read moreResearcher Ruben Santamarta shared the details of his successful hack of an in-flight airplane Wi-Fi network – and other findings – at Black Hat USA today. BLACK HAT USA –...
Read moreResearcher Ruben Santamarta shared the details of his successful hack of an in-flight airplane Wi-Fi network – and other findings – at Black Hat USA today. BLACK HAT USA –...
Read moreXori Adds Speed, Breadth to Disassembler Lineup
August 10 2018A new open source tool, introduced at Black Hat USA, places a priority on speed and automation. One of the problems in malware analysis is that there’s just so...
Read moreXori Adds Speed, Breadth to Disassembler Lineup
August 10 2018A new open source tool, introduced at Black Hat USA, places a priority on speed and automation. One of the problems in malware analysis is that there’s just so...
Read moreAWS Employee Flub Exposes S3 Bucket Containing GoDaddy Server Configuration and Pricing Models
August 10 2018Publicly accessible S3 bucket included configuration data for tens of thousands of systems, as well as sensitive pricing information. Editors’ note: This article and its headline was updated to...
Read moreAWS Employee Flub Exposes S3 Bucket Containing GoDaddy Server Configuration and Pricing Models
August 10 2018Publicly accessible S3 bucket included configuration data for tens of thousands of systems, as well as sensitive pricing information. Editors’ note: This article and its headline was updated to...
Read moreOh, No, Not Another Security Product
August 10 2018Let’s face it: There are too many proprietary software options. Addressing the problem will require a radical shift in focus. Organizations and businesses of all types have poured money...
Read more
Recent Comments