In Pictures: 15 of the scariest things hacked
From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister.
Online security experts vpnMentor have investigated the accessibility of Amazon Echo by hacking into one unsuspecting family’s device, highlighting how easily it could be tampered with.
WikiLeaks has released more than 8,700 documents it says come from the CIA's Center for Cyber Intelligence, with the documents saying the agency had 24 "weaponized" zero-day exploits for the Android operating system as of 2016.
More than 100 members of the Israel Defense Forces, the majority of them stationed around the Gaza strip, fell victim to a cyberespionage attack that used malicious Android applications to steal information from their mobile devices.
Two senators have written to the U.S. Department of Defense about reports that President Donald Trump may still be using an old unsecured Android phone, including to communicate through his Twitter account.
A security researcher is showing that it’s not hard to hold industrial control systems for ransom. He's experimented with a simulated water treatment system based on actual programmable logic controllers (PLCs) and documented how these can be hacked.
A ‘white hat’ is an ethical computer hacker or cyber security expert. White hat hackers often conduct exploratory testing to ensure an organization or computer system is properly protected.
Every time there's an election, the topic of hacking one comes to the surface. During a presidential election, that conversation gets louder. Yet, even the elections held every two years see some sort of vote hacking coverage. But can you really hack...
Here’s how to find out if your child is involved in malicious online activity -- before the authorities do
"Hunting is not a sport. In a sport, both sides should know they're in the game." - According to Field and Stream magazine, this is an oft quoted hunting expression. I couldn’t resist the irony of applying this quote to the cyber security industry wh...
Netflix is securing the borders of its US library, but the latest crackdown is another token effort in a war it can never win.
Having an identity and access management solution is a must. Businesses cannot operate without them. However, this paper asks - are you sure the user credentials are being used by the correct individual? · Most organizations work hard to ensure compliance with corporate security policy but that doesn’t necessarily mean they’re protected · Managing identities is essential—but it can also lead to a false sense of security · Do the credentials and the behaviour make business sense? If you can’t interpret activity in the context of identity, you may be at risk
What's new, plus best mac-related tips
and tricks
The latest business news, reviews, features and whitepapers
Watch our video news and reviews from around the world
Comprehensive buying guides, features, and step-by-step articles
Aruba Instant On AP11D
Set up is effortless.
Aruba Instant On AP11D
The strength of the Aruba Instant On AP11D is that the design and feature set support the modern, flexible, and mobile way of working.
Aruba Instant On AP11D
Aruba backs the AP11D up with a two-year warranty and 24/7 phone support.
Dynabook Portégé X30L-G
Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.
MSI P65
This smart laptop was enjoyable to use and great to work on – creating content was super simple.
MSI GT76
It really doesn’t get more “gaming laptop” than this.