The threat landscape is constantly evolving, and it’s an enterprise’s job and duty to keep up with the changes and do the best it can to protect its data, employees and networks.
Intercepting voice calls, SMS messages, and web traffic coming and going from a target's mobile phone may be as simple as waiting for his phone to associate to a hackable femtocell and then use it to spy on him or even clone his device, iSEC researchers warned at a demonstration at the Black Hat conference.
A presentation by two Spanish researchers scheduled to take place later this month at the Black Hat conference in Las Vegas will apparently prove that hijacking modern cars via electronic means is not only easy, but cheap to execute as well.
Withdrawing cash from an ATMs by using a debit or credit card or paying with it at a point-of-sale may soon become a thing of the past, as several manufacturers have presented technologies that will let users perform the same actions by simply using their smartphone or even their face.
A fascinating but technically illegal experiment conducted by an anonymous researcher has witnessed over 420,000 Internet-connected devices being roped into a botnet that functioned as a distributed port scanner aimed at mapping IPv4 address usage across the Internet.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.