Hacking 4G USB modems and SIM Card via SMS

December 31, 2014 Added by:Pierluigi Paganini

A group of experts managed to uncover USB modem vulnerabilities that allow a potential attacker to gain full control of the connected system.

Comments  (0)


Security in 2015: The Internet Becomes the Corporate Network Perimeter

December 05, 2014 Added by:Paul Lipman

The cloud has been widely hailed as the most disruptive force in modern business. Indeed, the world is in the midst of fundamentally profound transformations, enabled by the cloud, in the ways in which we access and interact with data and applications. Unfortunately, the security industry has not kept pace with these transformational trends, necessitating an equally profound change in the way we s...

Comments  (0)


Phones, Phablets and Clouds - Securing Today’s New Infrastructure

December 03, 2014 Added by:Steve Durbin

Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Countless organizations are still playing catch up – Bring Your Own Device (BYOD) polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workp...

Comments  (0)


Can Hackers Get Past Your Password?

November 05, 2014 Added by:Steve Durbin

Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.

Comments  (2)


Verizon Injecting Perma-Cookies to Track Mobile Customers, Bypassing Privacy Controls

November 04, 2014 Added by:Electronic Frontier Foundation

In an effort to better serve advertisers, Verizon Wireless has been silently modifying its users' web traffic on its network to inject a cookie-like tracker.

Comments  (0)


Cracking Wifi Passwords With Kali Linux

October 29, 2014 Added by:Javvad Malik

In under a dozen commands you can potentially grab a wifi password, which is script kiddie territory. The real question goes a lot deeper what can be done with this information?

Comments  (1)


The True Cost of a Data Breach

October 20, 2014 Added by:Thu Pham

iThemes, a WordPress (WP) security provider, was recently breached and approximately 60,000 clients in their membership database had a slew of information stolen, including usernames, passwords, IP addresses and more. But, what is of particular concern is the fact that the company was storing their members’ passwords in plain text, which they admitted was in error in a 

Comments  (0)


When Remote Access Becomes Your Enemy

October 16, 2014 Added by:Patrick Oliver Graf

As convenient as it would be for businesses to have all their IT service providers working on-site, just down the hall, that’s not always possible.

Comments  (0)


Spying Flashlight Apps Reveal User Inattentiveness to Cyber Security

October 15, 2014 Added by:Tripwire Inc

What we often don’t realize, however, is the amount of personal information our phones actually store and how easily accessible we make this data, not only for ourselves, but for others, too. A recent Android study proves many of us are likely not careful enough.

Comments  (0)


Industry 4.0: Flexible Production Needs Secure Networking

September 29, 2014 Added by:Patrick Oliver Graf

When IT departments are not consulted, gaps in network security could appear.

Comments  (0)


Are Rogue Cell Towers Snooping On Your Calls?

September 08, 2014 Added by:Tripwire Inc

There are 17 bogus cellphone towers operating across the US that could be used to snoop on, and even hijack passing calls, texts and other communications, according to an article published in Popular Science last week.

Comments  (0)


Back to BlackBerry: Frustrated Mobile Users Reject BYOD for the Former Market Leader

August 05, 2014 Added by:Patrick Oliver Graf

Thanks to what some say are restrictive Bring-Your-Own-Device (BYOD) and remote access policies, some mobile devices users in the corporate world are rebelling against BYOD – specifically, they don’t want their personal mobile devices to be controlled by their employer’s IT administrators.

Comments  (0)


Tesla Cars Hackable – Protected by 6 character Password

April 02, 2014 Added by:Dan Dieterle

Black Hat Asia presenter and security researcher Nitesh Dhanjani explained last week that the car could be locked and unlocked by cracking a short password.

Comments  (0)


Android Webview Exploit Tutorial

March 06, 2014 Added by:Dan Dieterle

Around 70% of all Android devices in the field are subject to a Javascript exploit that could allow an attacker remote access to your phone by doing nothing more than surfing to a malicious page or scanning in a malicious QR Code.

Comments  (0)


Security Advisor Alliance, A Nonprofit of Elite CISOs giving back to the community.

November 12, 2013 Added by:Jason Clark

Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.

Comments  (1)


Vehicle VPNs, Part One: The ‘Connected Car’

October 28, 2013 Added by:Patrick Oliver Graf

Remember, anything that is connected to the Internet is a potential target for hackers and cyber criminals. If they’ll hack your smartphone, tablet or laptop computer, who is to say they won’t try to do the same to your car?

Comments  (3)

Page « < 1 - 2 - 3 - 4 - 5 > »