Privacy, please! Why a VPN on your smartphone may be a smart move for you.
Using a VPN on your smartphone can boost your privacy in a big way, particularly with all the data tracking that’s happening out there today. For some time now, we’ve recommended a VPN when using public Wi-Fi in airports, libraries, hotels, and coffee shops. Given that these are public networks, a determined hacker can snoop […] more…Game of Threats
Introduction While the way we consume TV content is rapidly changing, the content itself remains in high demand, and users resort to any means available to get at it – including illegal and non-ethical ones like the use of pirated stuff. The world is embracing the idea of paying for entertainment more and more with […] more…Trojan watch
We continue to research how proliferation of IoT devices affects the daily lives of users and their information security. In our previous study, we touched upon ways of intercepting authentication data using single-board microcomputers. This time, we turned out attention to wearable devices: smartwatches and fitness trackers. Or more precisely, the accelerometers and gyroscopes inside […] more…Can Internet of Things be the New Frontier for Cyber Extortion?
The Internet of Things (IoT)—the network of devices embedded with capabilities to collect and exchange information—has long been attracting the attention of cybercriminals as it continues to gain momentum in terms of its adoption. Gartner has estimated that more than 20.8 billion IoT devices will be in use by 2020; IoT will be leveraged by […] more…More information
- White House Issues Executive Order on International Data Protection
- Tor Project raises over $200,000 in crowdfunded support
- BKDR_RARSTONE: New RAT to Watch Out For
- No end in sight for chip shortage as supply chain problems pile up
- Google Glass’ apparent successor debuts—on a pawn shop’s eBay page
- Romney tax returns allegedly hacked, supposedly held for $1 million ransom
- A Firmware Issue Threatens to Make PS4 Games Unplayable
- Microsoft Office for Mac VU#125336 Remote Code Execution Vulnerability
- ScholarSphere service interruption, 11/22/2013
- Group That Caused Power Outage Stops Focusing Exclusively on Ukraine