In defense of the IoT: First-hand experience
Credit to Author: Jeffrey Esposito| Date: Tue, 27 Mar 2018 13:00:08 +0000
The day I turned home network defender and stopped making fun of IoT developers.
Read moreCredit to Author: Jeffrey Esposito| Date: Tue, 27 Mar 2018 13:00:08 +0000
The day I turned home network defender and stopped making fun of IoT developers.
Read moreCredit to Author: Nikolay Pankov| Date: Mon, 26 Mar 2018 15:54:34 +0000
Even if you are really not an interesting target for an APT actor, you can still be used in a malware delivery chain
Read moreCredit to Author: Julia Glazova| Date: Mon, 26 Mar 2018 13:00:37 +0000
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.
Read moreCredit to Author: Serge Malenkovich| Date: Tue, 20 Mar 2018 15:10:22 +0000
At this year’s Security Analyst Summit, Inbar Raz revealed how he managed to crack a cafe chain’s loyalty card system, a taxi service, and an airport
Read moreCredit to Author: Jeffrey Esposito| Date: Fri, 16 Mar 2018 15:09:52 +0000
Jeff sits down with Thiago Marques and Santiago Pontiroli to discuss their talk at #TheSAS2018 on Prilex and the carding scene in Brazil.
Read moreCredit to Author: Eldar Kudinov| Date: Thu, 15 Mar 2018 14:32:01 +0000
Yachts are now Internet-friendly — and vulnerable because developers aren’t focusing on information security.
Read moreCredit to Author: Jeffrey Esposito| Date: Thu, 15 Mar 2018 12:57:09 +0000
In this podcast, Jeff and Dave discuss Fortnite accounts being compromised, Bitcoin mining in rural America, porn-themed crypto currency and more.
Read moreCredit to Author: Nikolay Pankov| Date: Fri, 09 Mar 2018 20:14:27 +0000
One of the most sophisticated APT campaigns ever analyzed by our experts.
Read more