Who looks through Big Brother’s eyes
iPower, a company behind a cloud storage service for government agencies, was surprised to discover a virus lurking in one of the body cameras used by policemen. People are getting
391 articles
iPower, a company behind a cloud storage service for government agencies, was surprised to discover a virus lurking in one of the body cameras used by policemen. People are getting
The Internet changes from year to year and online threats develop along with the World Wide Web. So what will the cyber-nightmare of home and corporate users look like in
Nowadays, free public Wi-Fi is available almost everywhere in our cities. We can access the Web from the streets to the subway and buses, not to mention venues ranging from
Following recent terrorist attacks accusations against encrypted means of online communications once again became louder. However the proposed solutions could create even more problems. Governments around the world – from
Ransomware has become one of the most notorious cyberthreats. Once a ransomware Trojan infiltrates your system, it stealthily encrypts your files, including your valuable documents, videos and photos. This entire
There is no decent alternative to passwords, especially when it comes to protecting your email, personal finances and devices that store your personal data. That’s why it’s crucial to use
It was last year when a new method of attack on cellular networks was discovered. It requires neither costly radio scanners nor PC powerhouses and is available to virtually anyone.
Checking in to an airport to brag that you are on your way to a Parisian getaway is so yesterday. For starters Swarm has lost it’s luster and usage since
A year ago our colleague David Jacoby, a researcher at GReAT, successfully attempted to hack his own home and discovered a lot of curious things. David’s experiment inspired many Kaspersky
While communication technology providers are seeking consensus over the future of 5G networks, carriers are wasting no time in rolling out new technologies available for the current 4G networks. Voice
At the Cyber Security Summit 2015 in Boston Joseph Bonavolonta, Assistant Special Agent in Charge of the FBI’s CYBER and Counterintelligence Program in its Boston office, revealed how the bureau treats ransomware. “To
British scientists proved that Android devices are highly dangerous when it comes to you and your data. It’s no joke — researchers at the University of Cambridge did serious research
I wonder what will happen when there are no more infosec problems. Will our Threatpost.com news blog convert to a digest of kitty cats? Is this bright future feasible at
I would like to start this week’s new edition of Security Week with news that has nothing to do with information security. Volkswagen diesel vehicles happened to be emitting far
In fact, it’s the one of the most widely believed myths in the infosec world. At the same time, it’s the most non-standard one. That double-sided nature is likely the
In the new installment of our explosive hit series “Infosec news”: The breach of Bugzilla serves a harsh reminder of the necessity to make passwords BOTH strong and unique. The
Turla APT group, also known as Snake and Uroboros, is one the most advanced threat actors in the world. This cyber espionage group has been active for more than 8 years,
If hacking were high fashion, this season’s hot trend would be car hacking. Shortly after researchers Charlie Miller and Chris Valasek revealed details on Jeep Cherokee’s breach, another team managed
Recently we wrote about the now-famous hack of a Jeep Cherokee. At Black Hat USA 2015, a large security conference, researchers Charlie Miller and Chris Valasek finally explained in detail,
Security experts often mention exploits as one of the most serious problems with data and systems safety; although it’s not always clear what the difference is between exploits and the
Oops, they’ve done it again: after two successful breaches into the systems of Toyota Prius and Ford Escape, security researchers Charlie Miller and Chris Valasek have recently hacked a Jeep