Related Content
New Malware Prototype Doesn't Need Internet Access to Run Amok Researchers in Germany have discovered a new way to transmit information between computers infected with a proof-of-concept malware prototype that does not need to be connected to the Internet to run amok. All it needs is access to a computer's microphone and speakers. |
||
Our Automated Tomorrow: The Rise of Drones and Robots Amazon made headlines recently with Jeff Bezos’ statement that the company is testing drones for package deliveries. Knightscope is building a mobile security guard robot that may soon be monitoring school campuses. Advances in embedded software and robotics make for exciting new technologies. |
||
Simple Security Suggestions to Protect Your Personal Information Protecting your private information should always be on your mind when you use technology, but security doesn't have to be a heavy burden that hovers over your every move. Read on for some simple suggestions that could be helpful in shoring up your personal security. |
||
Privacy Testing: A Growing Field for Software Security Specialists Security is not just about preventing hacks. There is a larger aspect to consider: user privacy and how organizations handle collected user data. Privacy testing is still a niche field, but it is growing as users become more aware of protecting themselves and social networks gain popularity. |
||
Twitter: The Anti-Social Media Giant? Twitter has taken a stand against the NSA and any party trying to snoop around their servers and its users' information by implementing their perfect forward secrecy (PFS) plan for their mobile and web platforms. Read more to learn how this social juggernaut is keeping information private. |
||
A Consolidated Payment Card Sounds Convenient—But Is It Secure? Coin is supposed to be a replacement for all the plastic in your wallet. It can store programmed information for eight credit, debit, or store loyalty cards. Sounds pretty convenient, right? However, experts warn the card might not keep your information secure, and it still has issues to work out. |
||
The Latest Software News In this roundup of software-related news that matters to you, read about hackers who are attempting to disrupt GitHub and how a software glitch may have been responsible for delaying emergency help during the summer crash of an Asiana Airlines Boeing 777. |
||
Georgia Tech Issues Report on Emerging Cyber Threats for 2014 At the annual Georgia Tech Cyber Security Summit, cloud data storage, the Internet of Things, and mobile devices were listed as emerging cyber threats for 2014. Pamela Rentz highlights this and other news from the conference. |