No monkeys for CozyDuke
Yet another APT of the ‘Dukes family’ is hitting high-profile targets, including the US government office.
1447 articles
Yet another APT of the ‘Dukes family’ is hitting high-profile targets, including the US government office.
The story of how Israeli UAVs defend the country on the ground, in the sky, and in the information domain.
The annual RSA Conference in San Francisco, California of Internet-of-things insecurity and how no amount of money can fix computer security
Recent report by US GAO was treated by medias as “Modern aircrafts can be hacked and commandeered through onboard Wi-Fi”. Is it really that bad?
Everybody knows about flying drones, but there are also swimming and diving drones that patrol ports and ships, demine shores and so on. Let’s take a closer look at maritime robots.
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it also helped to locate Bin Laden.
Flightradar24 allows you to track what’s happening to any particular aircraft taking a family member or friend to their destination. Let’s find out how this service works.
Kaspersky Lab and the Dutch cyber-police created a tool that restores files encrypted by CoinVault ransomware.
Recently Interpol, Microsoft and Kaspersky Lab revealed and the shut down of a huge botnet which zombified about 770,000 PCs worldwide. Check this story out and then check your PC
Threatpost security reporters Chris Brook and Brian Donohue discuss the Github DDoS, Dyre banking malware, privacy threats, hacking and more
An annoying story of ‘free’ WiFi hotspots by St. Petersburg-based Smart WiFi. Nothing is for free, though, as you end up paying with your vk.com credentials
The word “IoT” (Internet of Things) has been a buzz word for several years now. It has become the era when more home electronics and cars are connected to the
Can we do anything to mitigate the human factor risks in aviation? The answer is: Yes, we can
There are many cool and funny projects in the world that deal with big data and we’ve gathered the Top 10 list of the most interesting ones. See for yourself!
There are several ways to avoid phishing attacks on your Facebook account. The common theme in each is to be highly suspicious of any online request for your personal information
Major social networks have been known to either unbundle their functionality into multiple apps, or buy other apps and not integrate their functionality into the main one.
Connection inside the aircraft is not that complex: it needs just a Wi-Fi access point, end of story. But deploying the channel on the outside is a totally different and fascinating concept
Tech giants Intel and IBM are seeking to hire Bitcoin experts, but their interest appears to be focussed on the service’s public ledger rather than the cryptocurrency itself
Mark Zuckerberg has officially allowed dozens of popular apps to operate within the realm of his Facebook Messenger
Fraudsters hacked Skype and tricked people from a contact list to send them about $5,000 over the course of a few days. Skype support, local banks and the police refused to do anything.
Windows 10 will offer users the ability to authenticate themselves with biometric identifiers rather than passwords