Hackers looking to break into companies could do so with the help of a $350 device that can be purchased online from Amazon or eBay, new research shows. By taking advantage of the way most employee… Source: Hackers break RFID badge security with equipment from Amazon |...
Read MoreWith consumer electronics products becoming smaller and increasingly more powerful over the years, students have started to come up with any number of clever ways to discreetly cheat on exams. You … Source: Cheating students caught using smartwatches and hidden cameras |...
Read MoreWhile most topics in the tech world tend to engender impassioned debate, there’s one issue that everyone can unanimously agree on: tech scammers who prey on and take advantage of unsuspecting… Source: Tech scammers are using deceptive webpages to steal thousands of dollars |...
Read MoreFirst, it was the FBI to break into an encrypted iPhone without Apple’s help. Around the same time, the LAPD was breaking into its an iPhone on its own. In either case, the mysterious hacks u… Source: iPhone encryption hack? India can break into Apple’s phones |...
Read MoreBYOD policies are meant to address mobile handsets, tablets and personal laptops, but CISOs must consider policies for other “IoT” devices that may end up on the corporate network and bring new risks. Source: When the IoT Comes to the Office |...
Read More