Please turn on your JavaScript for this page to function normally.
IoT
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts

Author: Nitesh DhanjaniPages: 296Publisher: O’Reilly MediaISBN: 1491902337 Introduction Whether you like it or not, the Internet of Things is happening. As the author …

Android ransomware gets new, professional look thanks to Googles Material Design

“Ransomware authors are stepping up their game: they have begun using Google’s Material Design language to create extremely convincing notices/ransom requests that …

Thousands of Zhone SOHO routers can be easily hijacked

Two days before he is scheduled to give a talk about discovering and exploiting 0-day vulnerabilities in SOHO routers’ firmware, security researcher Lyon Yang has …

Chinese hackers arrested at US request

Late last month, China’s president Xi Jinping made a state visit to the US and it resulted, among other things, in an agreement that the US and China will provide each …

Authentication bypass flaw in Netgear SOHO routers exploited in the wild

A critical security vulnerability affecting nine Netgear router models is being exploited in the wild. The flaw that the attackers took advantage of allowed them to access the …

Apple boots some ad blockers from App Store to protect users’ privacy

Less than a month has passed since the release of iOS 9, with which Apple welcomed third-party ad blocking apps, and the company has removed some of them from the App …

Which Android smartphones are most secure?

87% of Android devices are vulnerable to attack by malicious apps and messages, a group of researchers from Cambridge University in England has revealed.For years now, they …

Attackers compromise Cisco Web VPNs to steal login credentials, backdoor target networks

Another Cisco product is being targeted by attackers looking for a permanent way into the computer networks and systems of various organizations, Volexity researchers …

Former journalist faces 25 years in prison for article defacement

Matthew Keys, a former Reuters social media editor, has been found guilty of computer hacking, and could be sentenced to spend as many as 25 years in prison.Keys was indicted …

Hackers breach firm whose tech is used in Samsung Pay

It was revealed on Wednesday by the New York Times that LoopPay, a US-based Samsung subsidiary whose technology is central to the Samsung Pay mobile payment system, has …

Pen-testing drone searches for unsecured devices

You’re sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer …

Free tool to remove YiSpecter iOS malware

“Zimperium has released a tool to help iOS users that have been infected with the recently spotted YiSpecter advertising malware remove the threat from their devices. …

Don't miss

Cybersecurity news