Up to 100 million cars could be unlocked and potentially stolen by simply copying the radio frequency used in remote…
Browsing: Identity and access management (IAM)
Lieberman Software Webinar Explores the Growth of the Linux Platform, the Rise of Cyber Attacks Against Linux and How to…
It seems today, it’s no longer a question of if you will be breached, but when. Despite the best efforts…
It’s the time of year where back to school is on the minds of many. As your brain shifts out…
Professor Avishai Wool, CTO and Co-Founder of AlgoSec, discusses how organizations’ basic network structure can help or hinder APT attacks.…
The systems of the Oracle MICROS payment terminals division have been infected by a malware, systems worldwide are potentially at…
Security researcher Salvador Mendoza recently discovered a security flaw in Samsung Pay and discussed it during his Black Hat talk in Las…
Security researchers have found a previously unknown hacking group, Strider, that has been carrying out cyber espionage-style attacks against selected…
Following Brian Krebs’ report on a data breach at Oracle’s MICROS Point-of-Sale Division, Thomas Pore, Director of IT at Plixer commented below how…
Analysis from ABI Research for Verizon has shown that the ever growing number of IOT devices is expected to surge…