Please turn on your JavaScript for this page to function normally.
smart toys
Popular smart toys violate children’s privacy rights?

My Friend Cayla and i-Que, two extremely popular “smart” toys manufactured by Los Angeles-based Genesis Toys, do not safeguard basic consumer (and …

Sony IP camera
80 Sony IP camera models come with backdoors

80 different models of Sony IPELA Engine IP Cameras have multiple backdoors that can be misused by attackers to take control of the device, disrupt its functionality, add it …

Nintendo
Nintendo offers up to $20,000 for bug info

Video game giant Nintendo has set up a bug bounty program through HackerOne’s platform, and is asking researchers to find and flag vulnerabilities in the Nintendo 3DS …

Dailymotion
Dailymotion urges users to reset passwords in wake of possible breach

Breach notification service LeakedSource has added information about over 87 million Dailymotion users to its search index. The information includes 87+ million email …

Laws, regulations and contracts that infosec pros should be familiar with

If you’re a white hat and you want to continue being one, knowing what laws and industry regulations allow or not allow (or require or not require) you to do is of …

danger
Disttrack wiper malware hits Saudi Arabia’s aviation agency

Shamoon attackers with their Disttrack wiper malware have hit Saudi Arabian entities again. The Saudi government confirmed the latest breaches on Thursday, and for now the …

Tesco Bank card
Did Tesco Bank attackers guess victims’ payment card details?

A group of researchers from Newcastle University have discovered a practical and easy way for attackers to quickly guess individuals’ Visa payment card info needed to …

AirDroid
AirDroid app opens millions of Android users to device compromise

Tens of millions of users of AirDroid, a remote management tool for Android, are vulnerable to man-in-the-middle attacks that could lead to data theft and their devices being …

Heartbeat
Insecure pacemakers can be easily hacked

A group of researchers has discovered that it’s not that difficult for a “weak adversary” with limited resources and capabilities to fiddle with or even shut …

magnify
SAMRi10: Windows 10 hardening tool for thwarting network recon

Microsoft researchers Itai Grady and Tal Be’ery have released another tool to help admins harden their environment against reconnaissance attacks: SAMRi10 (pronounced …

Tor Project
Actively exploited Firefox, Tor Browser 0-day patched, update now!

Mozilla and the Tor Project have released security updates that fix the Firefox 0-day flaw that was spotted being exploited to de-anonymize Tor Browser users. It is still …

Europol
Europol terrorism investigations data found exposed online

700 pages of confidential dossiers, which included details about terrorism investigations in Europe, have been found exposed on the Internet by the reporters of Dutch TV …

Don't miss

Cybersecurity news