With the benefits of remote and mobile technologies, we must be realistic about the risks and challenges. See US-CERT’s recommendations for avoiding the Backoff malware and other online threats.
We often see costly breaches caused by stolen laptops or equipment. There are usually simple steps the organization could have taken to increase physical on-site security to prevent the loss of data and resulting fines.
We thought Google was simply collecting street-view images but they were also collecting your information without consent.
By exploiting the wireless capabilities, Jack claimed that he could hack into implantable cardioverter defibrillators and pacemakers.