Zeljka Zorz
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
Author: Nitesh DhanjaniPages: 296Publisher: O’Reilly MediaISBN: 1491902337 Introduction Whether you like it or not, the Internet of Things is happening. As the author …
Android ransomware gets new, professional look thanks to Googles Material Design
“Ransomware authors are stepping up their game: they have begun using Google’s Material Design language to create extremely convincing notices/ransom requests that …
Thousands of Zhone SOHO routers can be easily hijacked
Two days before he is scheduled to give a talk about discovering and exploiting 0-day vulnerabilities in SOHO routers’ firmware, security researcher Lyon Yang has …
Chinese hackers arrested at US request
Late last month, China’s president Xi Jinping made a state visit to the US and it resulted, among other things, in an agreement that the US and China will provide each …
Authentication bypass flaw in Netgear SOHO routers exploited in the wild
A critical security vulnerability affecting nine Netgear router models is being exploited in the wild. The flaw that the attackers took advantage of allowed them to access the …
Apple boots some ad blockers from App Store to protect users’ privacy
Less than a month has passed since the release of iOS 9, with which Apple welcomed third-party ad blocking apps, and the company has removed some of them from the App …
Which Android smartphones are most secure?
87% of Android devices are vulnerable to attack by malicious apps and messages, a group of researchers from Cambridge University in England has revealed.For years now, they …
Attackers compromise Cisco Web VPNs to steal login credentials, backdoor target networks
Another Cisco product is being targeted by attackers looking for a permanent way into the computer networks and systems of various organizations, Volexity researchers …
Former journalist faces 25 years in prison for article defacement
Matthew Keys, a former Reuters social media editor, has been found guilty of computer hacking, and could be sentenced to spend as many as 25 years in prison.Keys was indicted …
Hackers breach firm whose tech is used in Samsung Pay
It was revealed on Wednesday by the New York Times that LoopPay, a US-based Samsung subsidiary whose technology is central to the Samsung Pay mobile payment system, has …
Pen-testing drone searches for unsecured devices
You’re sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer …
Free tool to remove YiSpecter iOS malware
“Zimperium has released a tool to help iOS users that have been infected with the recently spotted YiSpecter advertising malware remove the threat from their devices. …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader