Some VW and Audi Cars May Be Hacked Through WiFi
| 0 CommentsThanks to researchers Daan Keuper and Thijs Alkemade (who work at the Dutch cyber-security firm Computest), newly [...]
Use Caution Traveling, Hackers Now Have Keys To Hotel Rooms
| 0 CommentsScore one for the good guys, but with hesitation. Unfortunately, in today's fast-moving digital world, even a victory [...]
Apple Will Officially No Longer Sell Routers
| 0 CommentsAfter more than two decades in the business, Apple is officially going to stop selling routers. The writing has been on [...]
Hackers Can Use PDF Files To Access Windows Credentials
| 0 CommentsSecurity researcher Assaf Baharav from Check Point Security has discovered a new twist on an old, fairly well-known [...]
WiFi Sync on iOS Vulnerable To TrustJacking
| 0 CommentsOwners of Apple devices have a new attack vector to worry about, called "TrustJacking." Symantec researchers recently [...]
Information On 48 Million People Leaked Through Massive File
| 0 CommentsFile this one away under self-inflicted wounds. It has recently come to light that a company called LocalBox left a [...]
New Malware Takes Screenshots and Steals Your Passwords
| 0 CommentsRecently, a new strain of malware called "SquirtDanger" has been found by researchers at Palo Alto Networks Unit 42, [...]
Are Lasers The Answer To Completely Wireless Computing And Charging?
| 0 CommentsResearchers at the University of Washington just might change the face of computers and computing forever. It may seem [...]
Get Updates on
Industry News
Sign up here to get the latest updates regarding cybersecurity, cloud computing, artificial intelligence (AI) and machine learning, as well as unified communications.