Hacking the Robotic Surgeon’s Hands and Eyes
New research demonstrates that it is possible to hack and hijack devices used to perform remote surgery
3984 articles
New research demonstrates that it is possible to hack and hijack devices used to perform remote surgery
Mid-April in Singapore was pretty hot not only because of tropical climate, but also because of INTERPOL World – a huge conference/exhibition organized by INTERPOL to give security product vendors
Technologies which seemed like they were from science fiction yesterday, are entering our everyday lives. One such tech is direct neural interfaces.
With an increasing amount of people using mobile devices for work, security of the data stored therein has become a hot topic. And since people also use mobile devices to access their finances, that makes them a prime target for cybercriminals. Android is the most popular mobile OS in the world right now, and the most targeted. How are users attacked and what is the current security status of Android?
Yet another APT of the ‘Dukes family’ is hitting high-profile targets, including the US government office.
The story of how Israeli UAVs defend the country on the ground, in the sky, and in the information domain.
Yet another Duke APT is hitting high-profile targets, including the US government office. This time it’s CozyDuke (also known as CozyBear, CozyCar or “Office Monkeys”, in honour of the video it employs as a decoy).
The annual RSA Conference in San Francisco, California of Internet-of-things insecurity and how no amount of money can fix computer security
The necessity of a product that is positioned in-between the enterprise-level suites and home-users solutions became apparent only a few years ago.
Recent report by US GAO was treated by medias as “Modern aircrafts can be hacked and commandeered through onboard Wi-Fi”. Is it really that bad?
While surfing the Internet, children may come across web pages containing inappropriate information. IT solutions can help protect children from such content.
In the dead of the night, a guy called my Mom and said in a weary voice: “Mom, I got into an accident. I’m in trouble. I’ll pass the phone to the officer, he’ll fill you in”. Here’s what happened next.
The global workforce is increasingly going mobile: 37% currently, up to 50% by 2020. There are more actively used mobile devices in any more or less developed country than there are adult citizens, so clearly “mobility” is something related to us all.
Everybody knows about flying drones, but there are also swimming and diving drones that patrol ports and ships, demine shores and so on. Let’s take a closer look at maritime robots.
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it also helped to locate Bin Laden.
Flightradar24 allows you to track what’s happening to any particular aircraft taking a family member or friend to their destination. Let’s find out how this service works.
With so many games and apps available for download on your mobile devices, it’s important to remember that not all of them are suitable for children. That’s why you should be monitoring what your kid installs.
Kaspersky Lab experts have discovered a new APT campaign that targets government institutions, mainly in the APAC region. It was named “Hellsing” after the string containing the project directory name found within the attack components’ code.
Security is a tough matter for small businesses for multiple reasons; startups and small entities tend to save on their IT wherever possible, and that’s where security failures are common.
Kaspersky Lab and the Dutch cyber-police created a tool that restores files encrypted by CoinVault ransomware.
The cybersecurity has become the everyone’s business, and it raises the demand for continuous update of information for everybody, both high-level security professionals and common corporate users. And especially for the latter, since it is them criminals attack most of the time.