The National Highway Transportation Safety Administration may not have gone so far as to call the software controliong the Google car human, but the agency did allow it can be viewed as the driver.
IT security professionals report that they are regularly pressured to roll out new technologies and devices regardless of whether they are secure, according to a new survey.
The AlienSpy remote access Trojan has evolved into a cross-platform backdoor that affects Windows, Linux, Mac OS X and Android operating systems.
Mozilla yesterday shed new light on its plan to phase out its Firefox operating system and instead focus on Internet of Things solutions, with an emphasis on data privacy and security.
From sales staff working the floor in large stores to corporate road warriors flitting from city to city, there is no debate about the degree to which mobile devices have increased productivity.
Researchers at Dr. Web spotted the Android.Xiny.19.origin trojan incorporated into more than 60 games in the Google Play Store.
Bank of America, Wells Fargo and JPMorgan Chase have announced plans to roll out ATMs that take smartphones as well as ATM cards.
Independent security researcher Justin Case discovered a "backdoor" in a processor made by manufacturer MediaTek.
Even the best security people can't be expected to know the whole zoo of devices being used across a large organization, reports James Hale.
Researchers at BugSec and Cynet discovered a bug in the LG G3 Android smartphone that could allow an attacker to run arbitrary code.
Researchers at Malwarebytes have spotted thieves using a phishing scheme to unlock stolen iPhones.
Sixty-seven percent of Android devices are prone to a newly discovered ransomware variant - the first to employ "clickjacking" as a way to fool users into giving away their administrator rights, Symantec warned today in its Security Response blog.
New research by the Ponemon Institute commissioned by Gemalto is showing there is a critical need for organisations to improve their payment data security practices.
The latest maintenance release from Samsung will include security patches that address several vulnerabilities capable of triggering arbitrary code executions, causing memory corruptions, or rebooting factory reset protections and reactivation locks (FRP/RL).
A Swiss digital surveillance law that has rankled online privacy advocates will now subjected to a public vote, after opponents collected enough signatures to challenge the legislation.
Mushrooming numbers of BYOD and IOT devices is putting corporate networks at risk, says ForeScout CEO Michael DeCesare in an exclusive video interview.
Lenovo issued patches to fix four issues found on some ThinkPad and IdeaPad devices that use the SHAREit app, including allowing remote system access and unauthorized access of transferred files.
Respondents to a new survey from FICO unanimously agreed: Data breaches this year in other industries will damage financial institutions.
After patching a critical flaw in the Android OS's code and releasing it to open source, Google hinted that Perception Point's estimate that more than two-thirds of the devices would be impacted by the Linux vulnerability was "exaggerated,"
What was once a low-threat, basic spyware trojan has evolved into very powerful banking malware capable of giving hackers near-total control over one's Android device, warned Kaspersky Lab yesterday.
Unregulated Chinese tech companies are selling IMSI catchers on the black market to oppressive regimes.
A bill that languished in the New York State Assembly last year that would require smartphone manufacturers to build a backdoor into their encrypted devices is still alive and could potentially be voted on at some point this year.
The recently discovered mobile-banking trojan SlemBunk is proving more resilient than first thought and is actively being used in several on-going campaigns.
Smartwatches and other wearable devices may make us vulnerable whenever we don them due to their motion sensors.
Sean Penn and Rolling Stone Editor Jann Wenner said the actor/director and the magazine took a number of security measures—including the use of "burner"phones and encryption to communicate and set up an interview with fugitive drug lord El Chapo.
Despite an encrypted email service on BlackBerry smartphones, forensic investigators in the Netherlands said they can read encrypted messages sent on the devices.
Researchers have spotted cybercriminals targeting vulnerable Android-based smart TVs with malicious apps capable of cyber home invasions.
Researchers identified a rogue app store that is accessible from anywhere in the world and allows users to download iOS apps to non-jailbroken devices.
Researchers discovered 13 apps related to the malicious game Brain Test in the Google Play store.
Macate, a manufacturer of secure smartphones, is finding itself caught smack dab in the middle of the battle raging between the federal forces looking to require backdoors on encrypted devices and those opposing that idea.
Sign up to our newsletters
SC Magazine Articles
- Skype targeted by T9000 backdoor trojan
- CISO salaries and demand for cyber-skills skyrockets, surprising no-one
- Student SSNs exposed in University of Central Florida breach
- Malwarebytes says sorry for multiple AV bugs, still unpatched
- Ransomware and POS attackers to zero in on small businesses, retailers
- Hearthstone gamers who download cheats may be cursed with malware
- Cryptowall has been a cash bonanza for criminals, failure for cops
- IRS hackers try to use stolen SSNs to generate E-file PINs
- Report: Pros urged to roll out IT projects before they are security-ready
- Security issues plague web dating software