Researchers at Context Information Security have demonstrated that it is very easy to monitor IoT devices that implement the Bluetooth Low Energy protocol. The Internet of Things is enlarging our s ...
Security experts at FireEye have published a report that details the cyber threats targeting various sectors in the Nordic countries. According to FireEye, threat actors targeted strategic industrie ...
The group of hackers known as Yemen Cyber Army has hacked the computer systems at Saudi Arabia, they control also Interior Ministry and Defense Ministry. The group of hackers known as Yemen Cyber Ar ...
Hi-tech car thieves use £30 jamming devices in car parks, the devices allow them to bypass car coding and reprogramme vehicles before driving off in them. Car thieves are becoming even more technolo ...