Tesla Hacking Report Is a Good Reminder of the Risks of Stored Data
It can be easy to forget how much personal data we share with the various technologies geared at streamlining our lives, be they voice assistants, smart home…
It can be easy to forget how much personal data we share with the various technologies geared at streamlining our lives, be they voice assistants, smart home…
While carriers continue working on building out 5G infrastructure before networks officially go live later this year, a team of researchers at the Korea Advanced Institute of… Read More
Secretary of Energy Rick Perry approved six “secret authorizations” to allow companies to sell “nuclear power technology and assistance” to Saudi Arabia as part of a plan… Read More
On Monday, we saw once again how criminals can exploit trust and use it as a weakness. Read More
The Federal Emergency Management Agency may have put the personally identifying information of millions of disaster survivors at risk of fraud and identity theft, according to a… Read More
The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency has issued an alert that some Medtronic implanted defibrillators contain vulnerabilities that would allow them exploited by…
Phishing is one of the most reliable methods a would-be hacker can take to access your digital accounts or even your bank account–and these kinds of attacks… Read More
Mirai malware, which can infect and grant even unsophisticated actorscontrol over hundreds of thousands of IoT devices, is responsible for some of the most devastating distributed denial-of-service… Read More
On the heels of this week’s news that a major tech company had scraped nearly a million images off Flickr to help train a facial-recognition tool, Senate… Read More
Facebook CEO Mark Zuckerberg–who used to be concerned about maintaining a low public profile until mounting scandals forced him into the limelight last year–understandably has a rather… Read More