Related topics: cyber attack · security · power plants · cyberattack

Researchers show how to use mobiles to spy on people

(PhysOrg.com) -- Researchers have demonstrated how it is possible to use GSM (Global System for Mobile communications) data along with a few tools to track down a person’s mobile phone number and their location, and even ...

Security chip that does encryption in PCs hacked

(AP) -- Deep inside millions of computers is a digital Fort Knox, a special chip with the locks to highly guarded secrets, including classified government reports and confidential business plans. Now a former U.S. Army computer-security ...

Oracle says Java is fixed; feds maintain warning

Oracle Corp. said Monday it has released a fix for the flaw in its Java software that raised an alarm from the U.S. Department of Homeland Security last week. Even after the patch was issued, the federal agency continued ...

BitTorrent co-founder now working with Hollywood

A Silicon Valley executive whose previous venture was synonymous with Internet piracy has found a way to play nice with Hollywood. BitTorrent Inc. co-founder Ashwin Navin is working with television networks and consumer electronics ...

Taking the edge off a pipe bomb -- literally

The Department of Homeland Security (DHS) Science and Technology Directorate's (S&T) new low-cost device for dismantling dangerous pipe bombs may look like a tinkerer's project, but that's no accident. The Semi Autonomous ...

US Senate fails to approve cybersecurity measure (Update)

The Senate failed Thursday to pass legislation to protect the U.S. electrical grid, water supplies and other critical industries from cyberattack and electronic espionage, despite dire warnings from top national security ...

page 1 from 12