IDG News Service - Get your conspiracy theories ready: Two founders of The Pirate Bay were due to speak at the Hack in the Box security conference in Kuala Lumpur on Wednesday, but didn't show up. The 3 p.m. speaking slot for Peter ...
Tags: Pirate Bay, Box security conference, Hack, cyber security
A variation of the recently disclosed attack that can wipe data from Samsung Android devices when visiting a malicious Web page can also be used to disable the SIM cards from many Android phones, researchers say. Ravishankar Borgaonkar, a ...
Tags: USSD, SIM Cards, Samsung, Android Devices
Computerworld - Security consulting firm SecureState today released a new open source hacking tool that it claims will let security researchers and penetration testers verify the security of electric utility smart meters being installed in ...
Tags: SecureState, Termineter, OptiGuard, Spencer McIntyre
Pacemakers from several manufacturers can be commanded to deliver a deadly, 830-volt shock from someone on a laptop up to 50 feet away, the result of poor software programming by medical device companies. The new research comes from ...
Tags: Pacemakers, shock, laptop, software programming, medical device companies
From Google Maps, the U.S. National Security Agency's parking lot has a larger footprint than the building itself. And for the high secrecy surrounding what goes on inside, there is plenty of information flowing just outside. In a ...
Tags: NSA, U.S., parking lot
Allowing employees to bring their own devices to work is causing new challenges, including what happens when a device needs to be wiped or employees want to sell their smartphone or tablet. Mobile security and BYOD (bring your own device) ...
Tags: BYOD, mobile security, RSA, security conference
Public private partnerships are key to the UK’s cyber security strategy, says Cabinet Office minister for political and constitutional reform, Chloe Smith. “We are all in this together. The government recognizes that and ...
Tags: cyber security, constitutional reform, Govnet Cyber Security Summit 2012
A trio known for their prowess in hacking Apple's iPhone software indicated on Thursday they may be edging closer to breaking the improved security measures in iOS 6. The hackers, who spoke at the Hack in the Box security conference in ...
Security researcher Michael Coppola demonstrated how small and home office (SOHO) routers can be compromised and turned into botnet clients by updating them with backdoored versions of vendor-supplied firmware. Coppola, who is a security ...
Tags: SOHO routers, botnet clients, backdoored versions, firmware
Global Payments, which back in the spring reported a data breach in which information associated with an estimated 1.4 million payment cards was stolen, has revealed that expenses associated with investigations, fines and remediation has ...
Tags: Global Payments, data breach, information, investigations, fines
A top Apple security guru Thursday presented an in-depth view into the security architecture for iOS, the basis of iPhones and iPad tablets, underscoring the complex certificate-based encryption framework Apple has adopted. Our attitude ...
Tags: Apple, security guru, iOS, iPhones, iPad tablets, crypto architecture
Microsoft released the technology preview of a new security toolkit that uses defenses inspired by one of the contestants of its BlueHat Prize security competition, the company said on Wednesday. The tool includes protection against ...
A researcher scored again against Oracles database by demonstrating at the Black Hat security conference Thursday an exploit that would allow him to take control as an administrator. David Litchfield, a researcher at Accuvant Labs, demoed ...
Tags: Oracles database, Black Hat, security conference, David Litchfield
Dutch security researchers hacked an iPhone 4S on Wednesday, showing how a malicious webpage can send all pictures, address book data and browsing history on the phone to a server of the attacker's choice. As participants in the Mobile ...
Tags: Dutch, security researchers, iPhone 4S, Mobile Pwn2Own competition
The U.N.’s civil aviation body will recommend creating a cyber security task force at a meeting next week in Canada, as new technologies introduced into aviation systems are increasing the risk of cyber attacks. The International ...
Tags: cyber security, UN, United Nations, new technologies, cyber