MOPs may allow a vehicle to cloak its position information from location services by using all radio communication channels available to it.
Blockchain has the potential to revolutionize the way businesses conduct financial transactions in the next few years, according to security experts.
Mobile security is becoming an increasingly tall task for enterprises. One of the biggest challenges is changing the consumer mindset that users have.
The decision by Consumer Reports to include security ratings in its product reviews could have implications for the way connected devices are designed.
In this installment of "In Security," the Great Dawnack's crystal ball depicted a troubling future for companies battling increasingly advanced threats.
For our RSA wrap-up, we summarized some key points and takeaways about emerging trends such as the IoT, security analytics and the IT skills shortage.
Connected devices are beginning to change ownership for the first time, which presents new IoT security challenges for manufacturers.
IoT security risks include physical, network, software and encryption attacks that target the sensor, network and application layers of IoT systems.
The EWF's Voice Privacy Alliance aims to help consumers enjoy the benefits and convenience of voice-enabled devices and avoid the security pitfalls.
A new Metasploit hardware bridge enables IT professionals to hack their own hardware, reducing the complexity of device-based vulnerability testing.