Embedded devices are everywhere and they make our lives more convenient, but from a security standpoint, they can be intimidating, especially if we're talking about an infusion pump or a piece of equipment that runs the critical infrastructure.
The threat landscape is constantly evolving, and it’s an enterprise’s job and duty to keep up with the changes and do the best it can to protect its data, employees and networks.
Intercepting voice calls, SMS messages, and web traffic coming and going from a target's mobile phone may be as simple as waiting for his phone to associate to a hackable femtocell and then use it to spy on him or even clone his device, iSEC researchers warned at a demonstration at the Black Hat conference.
A presentation by two Spanish researchers scheduled to take place later this month at the Black Hat conference in Las Vegas will apparently prove that hijacking modern cars via electronic means is not only easy, but cheap to execute as well.
Withdrawing cash from an ATMs by using a debit or credit card or paying with it at a point-of-sale may soon become a thing of the past, as several manufacturers have presented technologies that will let users perform the same actions by simply using their smartphone or even their face.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.