The user needs to specify in the configuration of the camera that HTTPS is used for communications—this is not enabled by default.
Fake BatteryBot Pro App Serves Malware, Can’t Be Deleted
The fake app provides the same functionality of the original version of BatteryBot Pro, but performs malicious activity in the background.
Kali Linux 2.0 Release Day Scheduled
We’ve been awfully quiet lately, which usually means something is brewing below the surface. In the past few months we’ve been working feverishly on our next generation of Kali Linux and we’re really happy with how it’s looking …
ICO Issued Over £1m in Fines in 2014/15
UK information commissioner launches annual report
Connected Devices Spark Digital Amnesia-And Insecurity
Most Americans use mobile phones as an extension of their brains—but aren’t securing them.
Fed Reserve: Chip and Signature Not Enough
Chip and signature is a half-measure, falling short of the chip and PIN technology deployed throughout the rest of the world.
Pakistan Implements Biometrics for Remote Teachers
Pakistan has embraced biometrics as its preferred authentication method to identify “ghost employees” and to combat absenteeism.
IT Pros Believe Cyberattacks Are Under-reported
87% of respondents think that large financial hacks are happening more often than reported, and right under the nose of security auditors.
Spikes Debuts Isolation Tech for Browser-borne Malware
The Isla family of web malware isolation appliances processes all web content on secure appliances deployed outside the network.
Click-Fraud Campaigns Could Lead to CryptoWall
Damballa researchers warn of hidden threats ‘in sheep’s clothing’