The Black Market Value of Your Hacked PC

The Black Market Value of Your Hacked PC

By Brian Krebs, Security Researcher A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer...
The 9 Most In-Demand Programming Languages

The 9 Most In-Demand Programming Languages

1.    SQL It’s no surprise SQL (pronounced ‘sequel’) tops the job list since it can be found far and wide in various flavors. Database technologies such as MySQL, PostgreSQL and Microsoft SQL Server power big businesses, small businesses, hospitals, banks,...
Quantum Computing and the Evolution of Encryption

Quantum Computing and the Evolution of Encryption

Fear sells in the computer security business. And in late 2015 Massachusetts-based Security Innovation got an unexpected boost from one of the scariest organizations around—the National Security Agency. For six years the company had been trying to create a new revenue...
Voice Command Hacks, Coming Soon

Voice Command Hacks, Coming Soon

Voice interfaces are becoming more ubiquitous and are now the primary input method for many devices. We explore in this paper how they can be attacked with hidden voice commands that are unintelligible to human listeners but which are interpreted as commands by...
Your Router Can Be Hacked Into a Global Botnet

Your Router Can Be Hacked Into a Global Botnet

You might want to upgrade the firmware of your router if it happens to sport the Netgear brand. Researchers have discovered a severe security hole that potentially puts hundreds of thousands of Netgear devices at risk. Disclosed by cybersecurity firm Trustwave, the...