Expert: Internet of Things Is "Out Of Control"

By Robert Vamosi | 4/26/12 4:30 AM

One security expert is warning that the Internet of Things is "out of control" and only going to get worse, as the number of interconnected devices out numbers the human population.

Read More >

Dangers of API Keys In The Cloud

By Robert Vamosi | 4/24/12 4:33 AM

The keys to data in the cloud are there for the taking, says one security expert. Specifically API keys, used to identify applications or the application's use of an API, could be used by malware to evade host-based security.

Read More >

Arduino Boards Can Remotely Start Your Car

By Robert Vamosi | 2/6/12 7:01 AM

Arduino boards are useful among security researchers for rapid prototyping of tools used in analysis. There's even an ARM-based version. Now researchers say they can start a car remotely using an Arduino board and a jailbroken iPhone.

Read More >

HP Firmware Hacks Patched

By Robert Vamosi | 1/3/12 3:19 AM

With much anticipation, the Columbia University researchers Ang Chui and Jonathan Voris presented their full findings on remotely hacking HP printers at the 28th Chaos Communication Congress in Berlin, Germany, last week.

Read More >

Class Action Lawsuit Against HP

By Robert Vamosi | 12/9/11 4:29 AM

In continued fallout following last week's disclosure by two Columbia University researchers that the lack of firmware authentication makes HP printers subject to remote attacks that could result in fires and other damage, David Goldblatt of New York has filed a class action suite claiming the company violated California laws designed to protect consumers from fraudulent or deceptive business practices.

Read More >

Memory Tokens That Can Stand The Heat

By JDavis | 7/12/10 8:08 AM

To combat the rising incidence of counterfeit medical products, medical device manufacturers can implement removable memory tokens that contain product authentication keys and other security features. However, the continued reuse of these small, detachable tokens in demanding hospital and healthcare settings can be problematic.

Read More >

Bugs Leave Buildings' Critical Systems Vulnerable

By JDavis | 5/26/10 9:42 AM

Cisco Systems is warning of flaws in one of their devices that could leave a building's critical systems vulnerable to attacks that might ultimately result in unauthorized takeover of the building. The device links together a building's critical systems--including security, lighting and HVAC--allowing IT personnel to automate and control these functions remotely.

Read More >

TI Calculators: Master Keys Cracked

By JDavis | 10/6/09 8:27 AM

The master operating system keys to a large number of Texas Instruments' calculators, which use RSA digital signatures to authenticate system updates, were recently cracked and published online.

Read More >

Hints from Mocana Engineering

By JDavis | 2/23/09 3:23 PM

What is the difference between an EAP pass-thru authenticator and an EAP standalone authenticator?

Read More >
COMMENTS