Emerging Technologies

Read: Security Researchers: Baby Monitors Prone to Hacking

Security Researchers: Baby Monitors Prone to Hacking

Security firm Rapid7 has discovered common security flaws with nine Internet-connected baby video monitors.

Read: University of Arkansas: Drones Banned for Security Reasons

University of Arkansas: Drones Banned for Security Reasons

The university’s new policy is an attempt to protect student privacy, according to officials.

Read: Malicious Software Attacks on Android Devices on the Rise

Malicious Software Attacks on Android Devices on the Rise

German security firm G DATA notes that analysts could identify a new strain of malware in Android smartphones every 14 seconds.

Read: Unmanned Drones Research Explores Commercial Video-Monitoring Capabilities

Unmanned Drones Research Explores Commercial Video-Monitoring Capabilities

Drone Aviation partnered with an aerospace research group at Virginia Tech to study the commercial application of tethered drones.

Read: Federal Court Says FTC Has Power to Enforce Cybersecurity

Federal Court Says FTC Has Power to Enforce Cybersecurity

The ruling serves as a wake-up call for enterprises, pressuring them to ensure their cybersecurity controls are effective.

Read: Scams, Extortion Follow in Wake of Ashley Madison Hack

Scams, Extortion Follow in Wake of Ashley Madison Hack

Exposed users of the adultery Web site, including thousands from the U.S. military and government officials, could be threatened by would-be extortionists.

Read: PSA Security Network Forges Vendor Partnerships to Advance Cybersecurity

PSA Security Network Forges Vendor Partnerships to Advance Cybersecurity

The roster of product and service providers is designed to augment systems integrator and manufacturer cybersecurity initiatives.

Read: Researchers: Hackers Can Remotely Swipe Fingerprints from Android Devices

Researchers: Hackers Can Remotely Swipe Fingerprints from Android Devices

FireEye researchers have uncovered a new vulnerability with Android devices, in which hackers can remotely steal fingerprints to gain unauthorized access to a user’s phone and data.

Read: Proactive Paths to Thwart Prox Card Threats

Proactive Paths to Thwart Prox Card Threats

Security integrators need to work with clients to stay ahead of proximity card threats.

Read: Google Fixes ‘Stagefright’ Bug in Android Devices

Google Fixes ‘Stagefright’ Bug in Android Devices

Google has announced software updates to fix Stagefright, a bug affecting Android devices, that allow hackers to take complete control over the smartphone by sending a text message with an infected video.

1 82 83 84 85 86 92
Get Our Newsletters