
Critical Security Vulnerabilities in Drug Injection Pumps
It emerged recently that certain Hospira drug infusion pumps contain dangerous and easily exploitable security vulnerabilities.
1159 articles
It emerged recently that certain Hospira drug infusion pumps contain dangerous and easily exploitable security vulnerabilities.
A legendary Soviet spy, Richard Sorge, is famous for conveying the exact date of the German invasion into the Soviet Union, and for letting the command know Japan had no plans of attacking the USSR in the Far East.
Five lessons from the story of the Enigma cryptographic machine which are still relevant.
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable.
CozyDuke APT is hitting high-profile targets, including the US government office. Initial penetration method is based entirely on social engineering techniques.
The story of how Israeli UAVs defend the country on the ground, in the sky and in the information domain.
The annual RSA Conference in San Francisco, California of Internet-of-things insecurity and how no amount of money can fix computer security.
Recent report by US GAO was treated by medias as “Modern aircrafts can be hacked and commandeered through onboard Wi-Fi”. Is it really that bad?
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it has also helped to locate Bin Laden
Recently Interpol, Microsoft and Kaspersky Lab revealed and shut down a huge botnet which zombified about 770,000 of PCs worldwide. Check this story out and then check your PC.
We need to learn from incidents, then implement much safer mechanisms to IoT systems that operated as parts of social/life infrastructures.
There are several ways to avoid phishing attacks on your Facebook account. The common theme in each is to be highly suspicious of any online request for your personal information
We are so used to divide the concept of IT security into two unequal subcategories, hardware- and software-centric. The hardware is usually considered relatively safe and clean — as opposed
There is new piece of ransomware out there going after the players of some 40 online games in an apparent attempt to target a somewhat younger crowd of computer users.
MWC often gladdens our heart with lots of visitors and participants who care much about security and that is quite natural taking into account that the event is held by
During my first two weeks of the biochip experience I had time to mull over a lot of things. The deluge of questions from the community pushed this process further:
For a regular user like you and me it’s hard to imagine the path of online payments and the obstacles that appear on the way of one dollar — or just
Threatpost reporters Chris Brook and Brian Donohue revisit last week’s Security Analyst Summit, an event put on by Kaspersky Lab in Cancun, Mexico. Talks of interest include the Kaspersky Lab
I woke up to find a Band-Aid on my hand. It was covering a small wound between the thumb and the index finger. That was when I had a WTF moment.
On February 19th of 2015, it came out that Lenovo’s laptops had been shipped with an adware Superfish preinstalled. There are two major problems with this issue. The first one is
Frequently we (and many, many others) write about different skimming techniques and other ways of compromising bank cards. Today, we’ll talk about the less apparent dangers that run the risk of