Space ISAC and NY InfraGard to Collaborate on Cybersecurity in Space

Space ISAC and NY InfraGard to Collaborate on Cybersecurity in Space The Space Information Sharing and Analysis Center (Space ISAC) and the New York Metro InfraGard Members Alliance (NYM-IMA) have…

Canopy Parental Control App Wide Open to Unpatched XSS Bugs

The possible cyberattacks include disabling monitoring, location-tracking of children and malicious redirects of parent-console users. Canopy, a parental control app that offers a range of features meant to protect kids…

IoT:It’s far too easy for abusers to exploit smart toys and trackers

Padlokr –  Padlokr –  JpegPhotographer/Shutterstock Saheli Datta Burton, UCL and Madeline Carr, UCL The wearable technology market is booming, with half a billion wearables sold globally in 2020. Apps on…

Aerial threat: why drone hacking could be bad news for the military

Padlokr –  Padlokr –  Are military drones a security threat to their own operators? Gorodenkoff/Shutterstock Mohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University Unmanned aerial vehicles, more…

Digital tech is the future, but a new report shows Australia risks being left in the past

Padlokr –  Padlokr –  Headway/Unsplash.com, CC BY-SA Shazia Sadiq, The University of Queensland and Thas Ampalavanapillai Nirmalathas, The University of Melbourne Digital technologies are now at the heart of our…

Google Report Spotlights Uptick in Controversial ‘Geofence Warrants’ by Police

Threat Post –  Threat Post –  Digital privacy rights defenders contend that geofencing warrants grab data on everyone near a crime, without cause. Newly released data by Google sheds light…

Cyberspace and outer space are new frontiers for national security, according to an expert report

Padlokr –  Padlokr –  Steven Freeland, Western Sydney University; Danielle Ireland-Piper, Bond University; Dan Jerker B. Svantesson, Bond University; Jonathan Crowe, Bond University; Samuli Haataja, Griffith University, and Wendy Bonython,…

iOS forensics

Day by day, smartphones and tablets are becoming ever more popular, and as a result, the technology used in development to add new features or improve the security of such…

How to discover open RDP ports with Shodan

Remote desktop protocol (RDP) allows you to connect to remote computers for administration through a remote desktop client to administer servers and systems. This protocol is generally discouraged because various…