Internet of Crappy Things, part 2: RSA conference edition
SAN FRANCISCO — It’s an utterly played out platitude that the security industry is largely failing at its mission to protect computers and networks and all the nearly infinite data
1118 articles
SAN FRANCISCO — It’s an utterly played out platitude that the security industry is largely failing at its mission to protect computers and networks and all the nearly infinite data
Recently the United States Government Accountability Office published a report warning the Federal Aviation Administration that aviation faces cybersecurity challenges in “at least three areas”, including the protection of aircraft avionics used to operate and guide aircrafts.
World nations are building fleets of unmanned robotic boats to perform missions above, on and under the water. Though there are only a few hundred unmanned maritime vessels in operation worldwide, drones
Flightradar24 allows you to track what’s happening to any particular aircraft taking a family member or friend to their destination. Let’s find out how this service works.
Many people still think that malware is a software that completely disrupts normal functioning of PCs. If your computer is working tip-top, it means it‘s not infected, right? Wrong. Malware creators are
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
Threatpost reporters Chris Brook and Brian Donohue discuss recent security headlines, including a contentious new Executive Order, the Dyre banking scheme, Github’s distributed denial of service troubles, the sale of
The word “IoT” (Internet of Things) has been a buzz word for several years now. It has become the era when more home electronics and cars are connected to the
There are many cool and funny projects in the world that deal with big data and we’ve gathered the Top 10 list of the most interesting ones. See for yourself!
The most devastating disappointment I have ever experienced since I started the biochip experiment is Apple’s position towards NFC. Or, to be more straightforward, the company’s desire to usurp the
During my first two weeks of the biochip experience I had time to mull over a lot of things. The deluge of questions from the community pushed this process further: it’s one
Though the number of high-profile announcements decreases with each passing year, one can still find lots of innovative gadgets at Mobile World Congress. We spent a few days at the
The latest privacy-related kerfuffle, involving Lenovo, who thought it was a great idea to pre-install some very nasty adware with gaping security holes, was like a blast from the past. Once
Do you know what your child is doing when s/he holding smartphone or tablet in his/her hands? Maybe everything is fine and s/he is just watching movies or playing game.
Last year one idea attracted a great deal of attention: PC games may be used to develop intellectual — or, more precisely, cognitive — abilities. The idea is probably as
The latest in a long line of whistleblower Edward Snowden’s National Security Agency revelations may be among the most shocking: that the NSA and its British counterpart, GCHQ, allegedly compromised
For a regular user like you and me it’s hard to imagine the whole path of online payment transactions and all obstacles that can appear on the way of one
I woke up to find a Band-Aid on my hand. It was covering a small wound between the thumb and the index finger. That was when I had a WTF moment.
Threatpost reporters Chris Brook and Brian Donohue revisit last week’s Security Analyst Summit, an event put on by Kaspersky Lab in Cancun, Mexico. Talks of interest include the Kaspersky Lab
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections.
Do you like working in open plan office? Many say no. That can be remedied by new ideas introduced by office space designers.