An international team of computer science researchers has identified serious security vulnerabilities in the iOS - the operating system used in Apple's iPhone and iPad devices. The vulnerabilities make a variety of attacks ...
A new cyberattack has been made against an unnamed bank, part of a coordinated campaign that follows February's theft of $101 million from the Bangladesh central bank, the international money transfer supervisor Swift said ...
Purdue researchers have developed a prototype system that could allow law enforcement and public safety agencies to tap into thousands of cameras located in numerous venues including parking garages, college campuses, national ...
Suppose the FBI wins its court battle and forces Apple to help unlock an iPhone used by one of the San Bernardino killers. That could open all iPhones up to potential government scrutiny—but it's not the end of the story.
A system using images and a one-time numerical code could provide a secure and easy to use alternative to multi-factor methods dependent on hardware or software and one-time passwords, a study by Plymouth University suggests.
Physical attacks on devices connected to the Internet can be detected by analysing WiFi signals, computer scientists have discovered.
Between your home network and the internet sits your broadband router. This humble device is often overlooked, yet it is also your first line of defence against hackers, malware and viruses.
It's every parent's nightmare. You lose track of your 4-year-old at a playground, and the next thing you know, and you're running around, frantically asking people if they've seen your child.
Unmanned balloons and satellites can be effectively used to achieve integrated crisis management across large areas, EU researchers have confirmed.
The market for military drones is expected to almost double by 2024 to beyond $10 billion (8.9 billion euros), according to a report published Friday by specialist defence publication IHS Jane's Intelligence Review.