Hacking control systems that regulate traffic lights in United States' big, gridlocked cities is not only possible in action films, but in reality as well, says Cesar Cerrudo, a security researcher with IOActive.
Target has announced that, effective May 5, Bob DeRodes will lead the company's information technology transformation in the wake of the massive breach it recently suffered.
Embedded devices are everywhere and they make our lives more convenient, but from a security standpoint, they can be intimidating, especially if we're talking about an infusion pump or a piece of equipment that runs the critical infrastructure.
The threat landscape is constantly evolving, and itís an enterpriseís job and duty to keep up with the changes and do the best it can to protect its data, employees and networks.
Intercepting voice calls, SMS messages, and web traffic coming and going from a target's mobile phone may be as simple as waiting for his phone to associate to a hackable femtocell and then use it to spy on him or even clone his device, iSEC researchers warned at a demonstration at the Black Hat conference.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.