A group of researchers from Cambridge University have discovered two critical flaws in the "Chip and PIN" (EMV) smart card payment system that can be misused to "clone" cards so effectively that normal bank procedures won't spot the fake.
The power of objects in the Internet of Things (IoT) to change the state of environments — in addition to generating information — will cause chief information security officers (CISOs) to redefine the scope of their security efforts beyond present responsibilities, according to Gartner.
Hacking control systems that regulate traffic lights in United States' big, gridlocked cities is not only possible in action films, but in reality as well, says Cesar Cerrudo, a security researcher with IOActive.
Target has announced that, effective May 5, Bob DeRodes will lead the company's information technology transformation in the wake of the massive breach it recently suffered.
Embedded devices are everywhere and they make our lives more convenient, but from a security standpoint, they can be intimidating, especially if we're talking about an infusion pump or a piece of equipment that runs the critical infrastructure.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.