Hacking the Aether: How Data Crosses the Air-Gap | Hackaday
http://hackaday.com/2017/02/02/hacking-the-aether/ Air-gapping a system from everything else does not guarantee that it is safe. There are many ways to cross air-gap. →
http://hackaday.com/2017/02/02/hacking-the-aether/ Air-gapping a system from everything else does not guarantee that it is safe. There are many ways to cross air-gap. →
https://www.yahoo.com/tech/study-finds-most-people-are-scared-theyll-be-hacked-but-dont-do-much-about-it-213141587.html →
http://www.darkreading.com/cloud/theres-no-one-perfect-method-for-encryption-in-the-cloud/a/d-id/1327972 →
http://securityaffairs.co/wordpress/55810/malware/washington-dc-cctv-ransomware.html Article on what can go wrong with insecure networked CCTV systems. →
http://www.cultofandroid.com/79308/researchers-hack-smartphone-fingerprint-scanners-with-inkjet-printer/ High resolution scan of your finger printed to paper with conductive ink can fool fingerprint scanners used on several smart phones. So is fingerprint safe identification method? →
http://interestingengineering.com/video/this-robot-beats-im-not-a-robot-captcha/ →
https://techcrunch.com/2017/01/26/trump-order-strips-privacy-rights-from-non-u-s-citizens-could-nix-eu-us-data-flows/ This order could be huge issue to some Internet companies if no work-around is worked for this. →
http://www.malc0de.org/1-million-google-accounts-compromised-by-android-malware-gooligan/ →
https://www.miradore.com/16-best-technology-websites-every-it-pro-should-bookmark/?utm_source=facebook&utm_medium=social&utm_campaign=blog This is a good list of IT sites worth to follow. →
http://motherboard.vice.com/read/the-worst-hacks-of-2016 This article takes a look at the biggest computer security incidents that were in the news in 2016. →