Google’s Nest thermostat can be hacked in under a minute, according to a blog post and video posted by GTV Hacker. The...
Mobile applications collecting personal data of users in one form or the other is no more a stunning news. The Snowden documents...
Smartphone apps and home equipment for scanning brainwaves could lead to a future in which governments or companies misuse such data as...
University of Berkeley researchers have revealed a technique for identifying individual web pages visited ‘securely’ by users, with up to 89% accuracy,...
The increasing use of QR codes as a way to add interactive elements, apps and websites to display advertising, competitions or print...
Couples who have been in a long-term relationship indulge in risky online behaviour, such as sharing passwords for online accounts, with two-thirds...
Body odor could be used as a biometric identifier, with high rates of accuracy, due to chemical patterns in the smell that...
A tiny, cheap gadget which can ‘hack’ into the network of modern cars to receive radio commands ranging from controlling steering and...
A statistical tool first used in 1966 and currently used in speech and gesture recognition may hold a key to sniffing out...
Computer users often feel bombarded by warnings about malware - particularly in internet browsers, which often repeatedly warn about risky sites -...
Major international cyber attacks follow a pattern - and attacks such as Stuxnet, which targeted Iran's nuclear plant can be predicted by...
Two researchers have demonstrated an attack that could alter and steal data direct from MicroSD cards, using tiny microcontrollers on the cards...
Have you checked out the weekly podcast by ESET security researchers? It's called the ESET Malware Report and it covers many security...
An audio communication system designed for ultrasonic underwater communications can be used to steal data - even from disconnected PCs in secure...
At least two recent models of Google’s flagship Nexus Android handsets can be crashed remotely - simply by sending them a flurry...
When any computer user types on a keyboard, the pattern of keystrokes is unique - like a fingerprint. When using a mouse,...
We are well familiar with the NSA‘s spying over its own citizens and all over the globe but can the government go to a limit...
More vulnerabilities have been discovered in a D-Link router, leaving the device vulnerable to attacks via its web interface - only weeks...
The system relies on users describing patterns of blots, then matching descriptions to patterns - and should be foil the automated programs...
A three-year-battle with a mysterious new strain of malware has led researcher Dragos Ruiu to conclude that the BadBIOS malware infesting his...
If sinister pieces of malicious code could rise from the dead on Halloween, which would be the most scary for antivirus researchers?...