The Latest in IT Security

1

If anyone still has doubts that the US Central Intelligence Agency (CIA) can track nearly anyone, anytime, anywhere, a new Vault 7 disclosure from WikiLeaks may dispel them. The CIA likely used malware codenamed ELSA to pinpoint and, presumably, track target Windows users over long periods, by hacking into WiFi radios on laptops – even when not connected to the Internet.

Read more ...

1

The mobile application that accompanies many Hyundai cars exposed sensitive information that could have allowed attackers to remotely locate, unlock, and start vehicles.
The vulnerability was patched in the latest version of the mobile app released in March but was publicly disclosed on Tuesday.

Read more ...

1

Julian Assange, Wikileaks’ founder and Russian propagandist, must be proud of himself. In his latest “revelation” that the Central Intelligence Agency can hack Apple and Android smartphones, PC operating systems and smart TVs, he has people throwing fits about how awful the CIA is. As my fellow Computerworld writer buddy Mike Elgan said, “The Wikileaks/CIA […]

Read more ...

1

So far IoT progress has been slow, but the wealth of opportunities offered by the technology emboldens a multitude of industries to look into leveraging IoT. Looking at the lax IoT security, medical device connectivity is not to be taken lightly. But what if consumer health wearables could play a vital role in self-diagnosis and […]

Read more ...

Categories

TUESDAY, JULY 25, 2017

Featured

Archives

Latest Comments

Social Networks