A New Way to Track Down Bugs Could Help Save IoT

On a clear day this summer, security researcher Ang Cui boarded a boat headed to a government biosafety facility off the northeastern tip...
A smartphone with apps displayed.

Australia’s surveillance laws could damage internet security globally, overseas critics say

Australia's new technology surveillance laws are drawing increasing scrutiny from international privacy groups and technology companies.Crimes, smartphone applications and data can cross borders...

‘Stealth Tech’: The Subversive Systems Threatening The Workplace

Smart equipment routinely being installed incorrectly by engineers or without being vetted… users bringing in their own smart tech gadgets… small businesses using...
Source: Goldman Sachs

Technology Spending by the Numbers: From Public Cloud to Security Measures

Deep pockets mean big-time investing for technology companies. According to the most recent survey of tech company chief investment officers by Goldman...

Millions of Google, Roku, and Sonos Devices Are Vulnerable to a Web Attack

In March, artist and programmer Brannon Dorsey became interested in a retro web attack called DNS rebinding, teaching himself how to illicitly access...

To Identify a Hacker, Treat Them Like a Burglar

Imagine someone robs your house. The savvy culprit didn't leave behind fingerprints, shoe prints, or any other discrete, identifying details. Still, police manage...
File photo: Garmin GPS. (Photo: Business Wire)

Y2K-like ‘bug’ could zap GPS systems, experts say – Fox News

File photo: Garmin GPS. (Photo: Business Wire) ...

How to buy smart—and secure—gadgets – Popular Science

How to buy smart—and secure—gadgets  Popular ScienceSmart home gadgets are undeniably cool, but these internet-connected devices are still just computers and come with similar...