Critical Security Vulnerabilities in Drug Injection Pumps
It emerged recently that certain Hospira drug infusion pumps contain dangerous and easily exploitable security vulnerabilities.
3199 articles
It emerged recently that certain Hospira drug infusion pumps contain dangerous and easily exploitable security vulnerabilities.
A legendary Soviet spy, Richard Sorge, is famous for conveying the exact date of the German invasion into the Soviet Union, and for letting the command know Japan had no plans of attacking the USSR in the Far East.
Five lessons from the story of the Enigma cryptographic machine which are still relevant.
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable.
Let’s imagine the things we would have to leave behind as a brand new world of driverless cars is evolving at a full speed (besides the enjoyment of driving itself)
We’ve created an infographic that shows how the Kaspersky Lab flagship antivirus software has improved over the last 10 years.
The tech which seemed something from science fiction yesterday, are entering our everyday lives. One of such gizmos is direct neural interfaces.
CozyDuke APT is hitting high-profile targets, including the US government office. Initial penetration method is based entirely on social engineering techniques.
The story of how Israeli UAVs defend the country on the ground, in the sky and in the information domain.
The annual RSA Conference in San Francisco, California of Internet-of-things insecurity and how no amount of money can fix computer security.
Recent report by US GAO was treated by medias as “Modern aircrafts can be hacked and commandeered through onboard Wi-Fi”. Is it really that bad?
While surfing the Internet, children may come across web pages containing inappropriate infor-mation. IT solutions can help protect children from such content.
In the dead of the night, a guy called my Mom and said in a weary voice: “Mom, I got into an accident. I’m in trouble. I’ll pass the phone to the officer, he’ll fill you in”. Here’s what happened next.
Everybody knows about flying drones, but there also are swimming and diving drones that patrol ports and ships, demine shores and so on. Let’s take a closer look at maritime robots.
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it has also helped to locate Bin Laden
Flightradar24 allows you to track what’s happening to any particular aircraft taking a family member or friend to their destination. Let’s find out how this service works.
With so many games and apps available for download on your mobile devices, it’s important to remember that not all of them are suitable for children. That’s why you should be monitoring what your kid installs.
Recently Interpol, Microsoft and Kaspersky Lab revealed and shut down a huge botnet which zombified about 770,000 of PCs worldwide. Check this story out and then check your PC.
We need to learn from incidents, then implement much safer mechanisms to IoT systems that operated as parts of social/life infrastructures.
Children who use mobile devices can be even more vulnerable because they are free to surf the Internet at any time or place, without adult supervision.
A New York artist made an exhibition out of making a single private and anonymous cell phone call outside the scope of government spying. Here’s how he did it.