Printers gone mad
50,000 printers worldwide suddenly printed a leaflet in support of youtuber PewDiePie. How can you protect your printer from hackers?
51 articles
50,000 printers worldwide suddenly printed a leaflet in support of youtuber PewDiePie. How can you protect your printer from hackers?
Which is older, the phone or the fax? Is it true that no one faxes anymore? And can a fax machine be hacked? (Spoiler: yes)
When it comes to online accounts, voicemail is a major security hole. Here’s why.
In this edition of the podcast, Jeff and Dave discuss a McDonald’s Monopoly whopper, banning miners, hacking by inmates, and more.
At this year’s Security Analyst Summit, Inbar Raz revealed how he managed to crack a cafe chain’s loyalty card system, a taxi service, and an airport
In this week’s podcast, Jeff and Dave discuss a breach impacting Massachusetts taxpayers, alien hackers, contactless payment fraud, and more.
In this week’s edition of Kaspersky Lab’s podcast, Jeff and Dave discuss a vulnerability in Sonic the Hedgehog, a woman who has a habit of sneaking onto flights and more.
Last week, a coworker shared an interesting article with me from the BBC. It reported that Germans were being told to destroy a connected children’s toy because of hacking concerns.
Nothing says the holiday season like over-spending on toys and devices for our children. It really shows how much we care – right? Chances are, there is a toy or
Cyber-physical security researchers Marina Krotofil and Jason Larsen presented their research on hacking chemical plants at Black Hat and DEF CON – this was a very fascinating talk. It’s not that hacking a chemical
Vitaly Kamluk has more than 10 years of experience in IT security and now he holds the title Principal Security Researcher at Kaspersky Lab. He specializes in malware reverse engineering, computer
Merchant vessels are continuously becoming bigger and getting more electronic systems. Seafarers often depend on technology data more than their own skills, knowledge, and senses. Crews are becoming smaller as computer
SAN FRANCISCO — It’s an utterly played out platitude that the security industry is largely failing at its mission to protect computers and networks and all the nearly infinite data
Recently the United States Government Accountability Office published a report warning the Federal Aviation Administration that aviation faces cybersecurity challenges in “at least three areas”, including the protection of aircraft avionics used to operate and guide aircrafts.
Blackhat was finally released in theaters and its strongest aspect is its technological portrayal of hacking.
Anyone who goes online could be hacked. During Christmas time, this possibility doubles as we make a number of purchases and get so excited that we forget about security.
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.
It would be nice to think that it would take a lot more than an overeager amateur hacker like Seth Green’s character from the 2003 movie “The Italian Job,” to bring traffic to a screeching halt.
This is a story of when security works, but it may also be the story of a new way to exploit the internet for dirty money: As you can easily
Social engineering, sometimes called the science and art of human hacking, has become quite popular in recent years given the exponential growth of social networks, email and other forms of
If you’re a registered Adobe client, change your passwords now. They have been stolen and published on the Internet, someone even made a crossword puzzle out of them. This is