At the end of March, hackers broke into the database for the Philippine Commission on Elections in what InfoSecurity Magazine is calling “what could rank as the worst ever government data breach anywhere.”
Matthew Garrett is a Security Developer for CoreOS, and noticed something interesting about the hotel he was staying in. They had installed tablets in the rooms to control the lights, temperature and shades. He also found that they weren’t protected.
A database for the Hello Kitty community sanriotown.com containing 3.3 million accounts has been discovered online in an apparent breach.
If you thought the US government’s ability to spy on its citizens had languished of late, think again.
The Naval Academy hasn’t taught midshipmen how to navigate by the stars in nearly 20 years, but it’s reintroducing the old-school approach to maritime travel. Why use a sextant instead of computers and GPS? Worries about ships stranded by cyber-attacks, which have the Navy re-thinking its reliance on tech.
Hackers, a 1995 movie starring Angelina Jolie’s haircut, hit theaters exactly two decades ago. Its themes have never been more relevant or concerning to our connected society. Can you remember them? I almost can.
Researchers at the University of Washington in Seattle have just hijacked a teleoperated surgical robot, demonstrating major security weaknesses in the machines that may eventually replace a surgeon’s hands in hospitals worldwide. Yikes.
War has been with us throughout our history — and it will likely continue to be with us for some time. But will the ways in which we wage war change? Here's how the wars of the future could unfold.
Kim Zetter is here to answer all of your questions about computer crimes and security, Stuxnet and digital warfare, online surveillance and privacy, and how living online is changing the world.
In the future, one company deals with the problem of data theft by inventing robotic couriers that will deliver their data packages no matter what gets in their way. But what happens when one of those packages contains a weaponized program?
For years, aerospace and defense companies have used 3D printers to mass-produce precision parts. Guided by digital blueprints, the printers create solid objects from layers of metal powder. A new report, however, warns that hackers could reconfigure the machines' settings, turning them into volatile explosives.
Security firm Kaspersky Lab has launched an interactive cyberthreat map that visualizes cyber security incidents occurring worldwide in real time. A quick glance shows that the world is a pretty scary place.
You know how virtually everything these days is connected to the internet? And how tech companies don't give a crap about security? Well, as a recent Internet of Things cyber attack has shown, our appliances are being made to turn against us.
Today US President Obama announced plans for a "cyberspace strategy" that includes everything from possible offensive cyberwar strategies to education. It also contains a little-discussed "identity management" plan that makes me wonder if Facebook profiles are about to become the new Social Security cards.