Security News

After devising ways of exfiltrating data from air-gapped computers via mobile phones, using radio frequencies, heat, rogue software that transmits electromagnetic signals at cellular frequencies,...





Here’s an overview of some of last week’s most interesting news, reviews and articles: Malware hidden in digitally signed executables can bypass AV protection Researchers have shown that it’s...

The problem of planted malicious USB devices is compounded by the fact that, no matter what, users will rarely stop to think and ultimately choose not to insert them because they don’t know what...


This Black Hat demo sheds light on how quickly an attacker can gain a foothold inside a network by luring victims with malicious “lost” USB drives.

Here’s an overview of some of last week’s most interesting news and articles: Faulty TLS implementation opens VISA sites, users to attack A group of researchers has discovered 184 HTTPS servers...