Security News

Running Cisco DNA Center? Update right now to get rid of the static admin credential
2018-05-16 22:50

Switchzilla scrambles out patches for trio of nasty flaws Cisco has issued updates to address a trio of critical vulnerabilities in its Digital Network Architecture (DNA) Center appliance.…

DNA in genealogy database leads to arrest of suspected serial killer
2018-04-30 12:08

If one of your relatives uploads their DNA data, much of yours goes with it.

Hacking a Gene Sequencer by Encoding Malware in a DNA Strand (Schneier on Security)
2017-08-15 11:00

One of the common ways to hack a computer is to mess with its input data. That is, if you can feed the computer data that it interprets -- or misinterprets -- in a particular way, you can trick...

GOP senators’ border wish list: drones, DNA collection, voice scans, and more (ArsTechnica)
2017-08-15 08:00

Civil libertarians tell Ars they’re worried about “mass surveillance expansion.”

Week in review: DNA-based malicious code injection, password power rankings (Help Net Security)
2017-08-14 01:46

Here’s an overview of some of last week’s most interesting news, podcasts and articles: New Cerber ransomware variant steals Bitcoin wallets, passwords Here’s a new reason to fear ransomware more...

Researchers pull off DNA-based malicious code injection attack (Help Net Security)
2017-08-11 13:30

Researchers have demonstrated that it’s possible to create synthetic DNA strands containing malicious computer code that, if sequenced and analyzed, could compromise a computer. The main goal of...

Malware Encoded Into DNA Hacks the Computer that Reads It (The Hackers News)
2017-08-10 01:01

Do you know — 1 Gram of DNA Can Store 1,000,000,000 Terabyte of Data for 1000+ Years? Even in March this year, a team of researchers successfully stored digital data — an entire operating system,...

Nature vs Nurture - Is Bad Cybersecurity in Our DNA? (Security Week)
2017-05-31 14:35

Einstein is often quoted as having said that insanity is doing the same thing again and again and expecting a different result. When it comes to cybersecurity, based on that definition, we must...