Hacking a train: a 37С3 talk
Ethical hackers told 37C3 how they found a few eye-openers while breaking DRM to fix trains.
23 articles
Ethical hackers told 37C3 how they found a few eye-openers while breaking DRM to fix trains.
Detailed analysis of Operation Triangulation, the most sophisticated attack our experts have ever seen, presented at 37C3 conference.
Researchers have created an extension to learn about the information websites collect to “fingerprint” browsers.
Can you transmit wireless data over a wired network? Evidence shows it can be done.
At WWDC 2020, Apple rolled out App Clips for iOS. We explain what that — as well as Android Instant Apps — is.
Listen to your cookies with the Listening Back browser extension to understand the real scale of Web tracking.
Researcher Fabian Ising, speaking at the Chaos Communication Congress, showed the limits of PDF encryption’s strength.
Researchers presented a study on the reliability of modern vehicle immobilization systems at the Chaos Communication Congress.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
Privacy International talks about period-tracking apps and the perils of sharing secrets with apps.
Four steps to reduce your company’s IT carbon footprint — and save money.
Researchers try to modify the contents of a signed PDF file without invalidating the signature.
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
Longer product life cycles mean sustainability; shorter ones are easier in terms of support. Which should you choose?
Analysis of a German sex toy reveals all sorts of vulnerabilities.
Security researchers found several ways to compromise hardware cryptocurrency wallets made by Ledger and Trezor.
Experts discovered lots of interesting things in the code of North Korean antivirus SiliVaccine.
Meet Lenny, the voice chatbot that can be used against telemarketers and phone scammers.
The year 2018 passed under the sign of Spectre and Meltdown hardware vulnerabilities. What does 2019 have in store in this regard?
Solar power and wind energy could one day replace oil and gas.
Do border agents have the right to search your devices? How can you protect your data from searches at the border? We have 11 tips covering this topic.