Congress is concerned that a breach of air traffic control systems by terrorists could lead to physical hijacking, or midair collisions.
D-Link Pushes Firmware Updates for Vulnerable Routers
Three vulnerabilities could allow remote code injection, perform DNS hijacking or expose configuration information.
Rights Groups Call For New UN Privacy Watchdog
Desperate need for analysis, research and clarification of best practice
Simple PwnPOS RAM Scraper Stays Hidden for Two Years
Trend Micro spots yet another PoS malware variant breaching card data across the globe
Cyber Security Gaps Appear All Over Europe
BSA study shows best practice implementation is patchy at best
ENISA Hopes to Spur Government Cloud Adoption With New Guide
Cloud Security Alliace and Darmstadt university contribute to best practice framework
Firewalls Remain Strategic Security Investments
An overwhelming 92% of respondents indicate that firewalls will stand as a “critical” component of their security infrastructures over the next five years.
D-Link Routers Face Multiple Vulnerabilities
An exploit could give an attacker root access, allow DNS hijacking and more.
Major Chip Kit Maker ASML Hit by Cyber Attack
Local media blames China but photolithography specialist plays down incursion
#MWC15: Complexity of IoT may slow adoption, warns AVG
Complexity is the major challenge that stands in the way of wide-scale adoption of internet of things devices in the home, Yuval Ben-Itzhak, CTO at AVG Technologies, told Infosecurity at Mobile World Congress 2015.