Wi-Peep: features of wireless peeping
Researchers find a new reliable way to track the location of wireless Wi-Fi devices.
59 articles
Researchers find a new reliable way to track the location of wireless Wi-Fi devices.
Home video surveillance systems are said to be safe. But are you ready to become a reality TV star without realizing it?
We investigate the connection between software security and leaks when handling RAM.
An interesting bug in one of the most popular embedded DBMS.
Seriously, don’t do it. A Kaspersky study of malware spreading in China shows why it’s always a bad idea.
How a vector graphics editor helped create one of the internet’s most important technologies, and why it led to huge security risks.
The top-4 technologies in use today that long belong in a museum.
The developers of a run-of-the-mill Python module recently found out why old unpatched vulnerabilities can be dangerous.
An unusual case of an attack executed by weaponizing legit video game code.
Takeaway from DEF CON 30: vulnerability in Zoom for macOS.
Security evolution: The large-scale, but short-lived ransomware epidemic of 2017.
Using a recent study on hardware vulnerabilities in processors as an example, we contemplate the cost of security.
Google Play’s app descriptions have a new Data Safety section now. We explain why this isn’t such great news.
We recall the story of the ILOVEYOU worm — one of the most infamous viruses from 22 years ago.
The story of the first serious attack on corporate IT infrastructure.
Apple’s new feature promises enhanced protection in the fight against targeted attacks.
We review a recent study on biometric authentication that uses breath analysis.
We explore the latest method for detecting hidden cameras and microphones described in one of the year’s best studies on personal security.
One of the most complex, yet easy to understand, infosec studies of recent times.
Queryable Encryption in the MongoDB database management system, and how it can improve data protection.