The Latest in IT Security

Posts Tagged ‘Exploit’

Hackers have demonstrated an exploit that can take remote control of a Jeep, to the extent of cutting the transmission and controlling the throttle. The two hackers, Charlie Miller and Chris Valasek, demoed the exploit – the result of a year’s work – to a Wired journalist, who wrote: “The result of their work was […]

Read more ...

Successfully hiding messages in images has already been done, but is it possible to deliver an #exploit in one – and run it? Saumil Shah, founder and CEO of Net-Square, has demonstrated at the #hack in the Box Amsterdam 2015 that it’s possible, and has posited that such attacks are more than likely to crop up […]

Read more ...

Security Archive: It is important to remember past security incidents to make sure we don’t commit the same mistakes over and over again. The idea is to learn from our mistakes. You can read other case studies from our security archive here: Jan 31st, 2009 – PHPbb.com hacked – Security archive case study Jan 17th, […]

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments