Russian-speaking cyber spies exploit satellites
Turla APT group, also known as Snake and Uroboros, is one the most advanced threat actors in the world. This cyber espionage group has been active for more than 8 years,
55 articles
Turla APT group, also known as Snake and Uroboros, is one the most advanced threat actors in the world. This cyber espionage group has been active for more than 8 years,
If hacking were high fashion, this season’s hot trend would be car hacking. Shortly after researchers Charlie Miller and Chris Valasek revealed details on Jeep Cherokee’s breach, another team managed to take over a Tesla
Security researcher Chris Rock discovered, that it’s very easy to kill a human. We are talking in a legal sense not the one that carries moral and legal consequences. All you need
Local governments and law enforcement are becoming increasingly more reliant on networked surveillance cameras in order to monitor densely populated urban areas. London is a notorious example of urban surveillance,
Last year one idea attracted a great deal of attention: PC games may be used to develop intellectual — or, more precisely, cognitive — abilities. The idea is probably as
“All the things I really like to do are either immoral, illegal, or fattening.” As always, there are exceptions.
Researcher discovers that Progressive Snapshot tools lack any real security controls and could be exploited by attackers to hack cars.
Are you getting enough sleep at night? If not, it might be because your sleep pattern is disrupted due to the display on your PC, TV, tablet, and smartphone.
A researcher has developed a nasty bootkit capable of taking complete control of Mac OS X devices. Here is what you need to know.
A new variant of the Zeus banking trojan has emerged, targeting consumer accounts at 150 banks in 15 countries.
A new APT campaign called Regin targets the usual victims plus a prestigious cryptographer and the GSM standard on which most cellular communications occur.
New research shows that studying and mnemonic devices could help us to better remember our passwords.
New analysis pinpoints some weaknesses in a new generation of cars with online capabilities. If exploited, this may result in car theft and other problems.