Key-Less Go Is The Modern Car Thieves Dream Feature
Just a couple weeks ago we described how digital keys equipped with crypto hardware could be used to secure the communication between all…
How Does The IoT Affect Smart Home Security – A Professional Locksmith’s View
Guest blog from Ralph Goodman. In a world where all of your devices communicate and can be controlled from one central location, there…
A Lot To Do For The Identification Segment 2015 – Everything You Need To Know
For the Identification Segment 2015 has been as exciting as it gets – we have seen some major highlights, security flaws, hacker attacks…
How To Secure Your Private IoT Environment
We all read the news about hacked baby monitors, cars or home networks. We all agree that we don’t want strangers to scream…
4 Concerning Questions Rising From The Jeep Hack & Chrysler’s Biggest Mistake
Got internet? Then you will probably have read about the Jeep Cherokee hack performed by Charlie Miller (Security Engineer, Twitter) and Chris Valasek (Director…
“No iOS Zone” – Hack Makes iOS Devices Useless
Israel-based mobile security company Skycure discovered an iOS vulnerability which could enable hackers to crash nearby devices and to put them in an…
Opinion: The ConnectedDrive hack could have been prevented
Just a couple weeks ago BMW made headlines when a security research group of the German automobile club ADAC discovered a major security gap in…