The Latest in IT Security

If anyone still has doubts that the US Central Intelligence Agency (CIA) can track nearly anyone, anytime, anywhere, a new Vault 7 disclosure from WikiLeaks may dispel them. The CIA likely used malware codenamed ELSA to pinpoint and, presumably, track target Windows users over long periods, by hacking into WiFi radios on laptops – even when not connected to the Internet.

Read more ...

The mobile application that accompanies many Hyundai cars exposed sensitive information that could have allowed attackers to remotely locate, unlock, and start vehicles.
The vulnerability was patched in the latest version of the mobile app released in March but was publicly disclosed on Tuesday.

Read more ...

Julian Assange, Wikileaks’ founder and Russian propagandist, must be proud of himself. In his latest “revelation” that the Central Intelligence Agency can hack Apple and Android smartphones, PC operating systems and smart TVs, he has people throwing fits about how awful the CIA is. As my fellow Computerworld writer buddy Mike Elgan said, “The Wikileaks/CIA […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments