Please turn on your JavaScript for this page to function normally.
power meter
ICS-CERT warns of remotely exploitable power meter flaws

Two remotely exploitable vulnerabilities, one of which can lead to remote code execution, have been found in Schneider Electric’s ION Power Meter products and FENIKS PRO Elnet …

Pokemon Go
Bogus Pokémon GO guide app roots Android devices

The popularity of Pokémon GO is apparently on the wane, but there are still more than enough players to make it a good lure for cyber crooks. In fact, fake apps like the …

Eyes
What proposed Rule 41 changes mean for your privacy

Last week, US Senator Ron Wyden took the floor of the Senate to explain why his (and his colleagues’) Stopping Mass Hacking Act should be voted in. The bill, consisting …

Adobe AIR
Android apps based on Adobe AIR SDK send out unencrypted data

Developers using the Adobe AIR SDK should update to the latest version of the software development kit and rebuild the apps as soon as possible if they don’t want their …

Google Nexus
Hack a Nexus from afar, get $200,000

Google has issued a challenge to bug hunters around the world: find a vulnerability or bug chain that achieves remote code execution on multiple Android devices knowing only …

American Express
Amex users hit with phishing email offering anti-phishing protection

American Express users are being actively targeted with phishing emails impersonating the company and advising users to create an “American Express Personal Safe …

ClixSense
6.6 million ClixSense users exposed in wake of site, company hack

If you’ve ever registered with ClixSense – and millions have – you can consider all your personal information shared with the service compromised. The …

Chevrolet Suburban
GM recalls 3.6 million cars due to potentially fatal software defect

Last Friday, General Motors has announced that the owners of some 3.64 million of its vehicles will have to come in for a re-flash of their sensing and diagnostic module (SDM) …

city
Improve SecOps by making collaboration easier

There’s one word that we’ve consistently been hearing from information security pundits year after year: Collaboration. More often than not, they were talking …

Stingray
Stingray use lacks transparency and meaningful oversight

Cell-site simulators – aka Stingrays, aka IMSI catchers – are widely used by US law enforcement, usually without a warrant that such type of surveillance should …

Gold
Man hacked, blackmailed gold bullion trading firm

25-year-old Adam Penny hacked the systems of an unnamed gold bullion trading firm, and used the stolen information about gold deliveries to intercept them before they are …

emergency
US 911 emergency system can be crippled by a mobile botnet

What would it take for attackers to significantly disrupt the 911 emergency system across the US? According to researchers from Ben-Gurion Univerisity of the Negev’s …

Don't miss

Cybersecurity news