Unmanned aerial vehicles - so-called drones - can be helpful, malicious, or simply disruptive, depending on the intentions of those who use them.
A team of researchers from the French Network and Information Security Agency (ANSSI) has devised a way to covertly exploit the Siri and Google Now voice activated personal assistants in order to make the target's smartphone send messages and emails, visit potentially malicious sites, make pricey phone calls or even become an eavesdropping device.
Plugging in random USB sticks in your computer has never been more dangerous, as a researcher who goes by the name Dark Purple has demonstrated his new device: USB Killer 2.0.
In a letter submitted to the Federal Communications Commission (FCC), Dave Täht, co-founder of the Bufferbloat Project, and Dr.
Author: Nitesh Dhanjani Pages: 296 Publisher: O'Reilly Media ISBN: 1491902337 Introduction Whether you like it or not, the Internet of Things is happening.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.