An upcoming talk covering security problems in Internet-connected cameras has been canceled after opposition from some manufacturers.
Gianni Gnesa was scheduled to give a presentation titled "Abusing Network Surveillance Cameras" on Oct. 14 at the Hack in the Box GSEC conference in Singapore.
The next time you’re thinking of throwing away a used boarding pass with a barcode on it, consider tossing the boarding pass into a document shredder instead. Two-dimensional barcodes and QR codes can hold a great deal of information, and the codes printed on airline boarding passes may allow someone to discover more about you, your future travel plans, and your frequent flyer account.
In the wake of last week's cookie security warning, accomplished Polish penetration tester Dawid Czagan has dug up a separate issue with Apple's Safari.
The bug Czagan has reported to Apple relates to its handling of the HTTPOnly flag, again leaving cookies open to attack.
BECOMING a penetration tester – or a ‘hacker’ in less polite company – is a rare thing in this part of the world, as Asian parents often push their children to become doctors, engineers or bankers.
This makes Lyon Yang (pic above), senior security consultant with Vantage Point Security, pretty much an outlier.
The European Court of Justice today struck down the 15-year-old data transfer agreement between the European Union and the US. Here's how to begin to prepare for the fallout.
T-Mobile US Inc said personal data of about 15 million of its U.S. subscribers may have been stolen in a breach at a unit of Experian Plc, which processes the telecom carrier's credit applications.
The records include names, dates of birth, addresses and encrypted fields with Social Security number and ID number, as well as additional information used in T-Mobile's own credit assessment.
T-Mobile had 58.9 million customers in total as of June 30. Payment card or banking information were not acquired, T-Mobile Chief Executive John Legere said in a letter on Thursday.
Apple is beefing up its Artificial Intelligence tech with the purchase of Perceptio, a small startup that worked on creating advanced AI systems on smartphones.
Perceptio’s specialization was figuring out how to run complex neural network algorithms without needing to share as much user data. That would seem to fall in line with Apple’s goal of providing more robust features for Siri without compromising users’ privacy in the process.
With apologies to George R. R. Martin, the drama around legitimate security research is starting to rival anything the Starks, Lannisters and Targaryens could muster.
Hardly a month goes by without some white-hat bug hunter wedged between a vendor or government threatening legal or regulatory action against disclosures that would serve only to make something more secure. Clearly some points on this vendor-researcher-policymaker triangle just don’t get that subtlety.
Microsoft is banking on a thin and powerful Surface Book laptop and fresh Lumia phones to make Windows 10 sexy.
Windows 10 has generated positive buzz ever since Microsoft released its latest operating system software ten weeks ago. Reviews have been favorable. And Microsoft says that 110 million devices are already running Windows 10, with over 1.25 billion visits to the Windows Store.
Soon after Dutch newspaper Volkskrant reported [in Dutch] about the Android vulnerability on the 27th of June, some members of the (security) community raised concerns about our attack.
It would be "nothing new" and "overrated". Some people [in Dutch] suggested that having a strong password already helps a lot, while others doubt the possibility of uploading malicious code on the Google Play Store and/or maintain that your phone will display plenty of warnings if you were to try this attack. They all miss the point.