With consumer electronics products becoming smaller and increasingly more powerful over the years, students have started to come up with any number of clever ways to discreetly cheat on exams. You … Source: Cheating students caught using smartwatches and hidden cameras |...
Read MoreWhile most topics in the tech world tend to engender impassioned debate, there’s one issue that everyone can unanimously agree on: tech scammers who prey on and take advantage of unsuspecting… Source: Tech scammers are using deceptive webpages to steal thousands of dollars |...
Read MoreFirst, it was the FBI to break into an encrypted iPhone without Apple’s help. Around the same time, the LAPD was breaking into its an iPhone on its own. In either case, the mysterious hacks u… Source: iPhone encryption hack? India can break into Apple’s phones |...
Read MoreBYOD policies are meant to address mobile handsets, tablets and personal laptops, but CISOs must consider policies for other “IoT” devices that may end up on the corporate network and bring new risks. Source: When the IoT Comes to the Office |...
Read MoreResearchers at mobile security company Lookout found 13 malicious apps on Google Play that are related to the Brain Test malware family. Source: BrainTest Malicious Android Apps Removed From Google Play | Threatpost | The first stop for security...
Read MoreGovernment officials in the Netherlands this week released a statement that actually calls for stronger encryption and rejects backdoors entirely. Source: Dutch Government Embraces Encryption, Denounces Backdoors
Read More