Tech tattoos turn into input devices, thanks to Microsoft and MIT
The DuoSkin from MIT Media Lab and Microsoft can be used as an input-, an output-, or communication device, depending on the user’s needs.
The DuoSkin from MIT Media Lab and Microsoft can be used as an input-, an output-, or communication device, depending on the user’s needs.
As it stands, the U.S. Cyber Command is joined with the NSA, but according to recent reports this may change.
Cisco Systems, Inc. has confirmed that the NSA-linked tools have targeted its Adaptive Security Appliance and PIX firewalls.
FTC courts hackers attending Black Hat, an amusing and frivolous action–at least for now.
If you think you’re safe from a cyber-attack because you block “red-flag” countries such as Iran, Russia, North Korea, and China, think again.
Top security researcher Dan Kaminsky says a single government agency to oversee cybersecurity is needed to avert emerging threats.
Hackers have learned to freeze (or melt) occupants under control of your WiFi thermostat. As IoT increases, so does the risk of infiltration.
Cyberespionage group Strider seems to be a major player in cyberwarfare.
Many technology companies offer bug bounty programs to help them find vulnerabilities in their product. The biggest tech company of all, however, has been absent… until now.
Ransomware has been around a while but only recently have attackers begun targeting large organizations. Cisco offers some tips to minimize the risks.