Fraud Protection June 6, 2018 Cybersecurity at the World Cup: What You Should Know 6 min read - Global sporting events require heightened cybersecurity because of the expanded digitization of sports venues.
Government May 29, 2018 What Are the Legalities and Implications of ‘Hacking Back’? 3 min read - The concept of "hacking back" opens up a wide range of cyber defense tools to IT and security managers. Lawmakers are interested in new rules that allow for more flexibility with these activities.
September 11, 2017 Scientists Show How Speech Recognition Software Can Be Compromised via Ultrasounds 2 min read - Through a DolphinAttack experiment, a group of researchers from China discovered an easy way to compromise speech recognition software.
August 10, 2017 Hacking Risk for Computer Vision Systems in Autonomous Cars 2 min read - Security researchers have demonstrated how it is possible to use stickers to get computer vision systems in autonomous vehicles to wrongly identify signs.
CISO August 4, 2017 Hire a Team of Hackers to Identify Vulnerabilities 3 min read - Many companies have adopted the practice of recruiting a team of hackers to poke holes in their networks and assess their incident response capabilities.
June 27, 2017 BlackTech Exploits Leaked Hacking Team Tools to Commit Cyber Espionage 2 min read - Security researchers linked three cyber espionage campaigns to a group that exploits leaked Hacking Team tools and flaws in outdated software.
May 18, 2017 With Teddy Bear Bluetooth Hack, 11-Year-Old Proves IoT Security Is No Child’s Play 2 min read - An 11-year-old boy used a clever Bluetooth hack to control his teddy bear and demonstrate that not even connected toys are immune to IoT security risks.
May 18, 2017 Apple Patch Update Fixes Bugs Discovered by Pwn2Own Contestants 2 min read - A recent Apple patch update addressed critical vulnerabilities discovered by contestants at this year's Pwn2Own hacking competition.
April 27, 2017 Did An IoT Device War Take Down Sierra Tel? 2 min read - On April 10, Sierra Tel discovered that its IoT device modems had been bricked, possibly by a vigilante trying to neutralize rogue devices.
April 20, 2017 Vigilante White-Hat Hacker Boosts IoT Device Security 2 min read - Hajime appears to have been created by a vigilante that is attempting to improve IoT device security and help IT decision-makers tighten defenses.