Please turn on your JavaScript for this page to function normally.
smartphone tools
Hacking smartphones with malicious replacement parts

Smartphone users can now add a new entry to the list of things they need to worry about: their phones being compromised via replacement parts. A group of researchers from …

Siemens
Siemens CT scanners open to remote compromise via publicly available exploits

Siemens has finally provided patches for a number of Microsoft Windows SMBv1 vulnerabilities that affect some of the medical devices sold under the Siemens Healthineers brand. …

airport security
US Border Patrol isn’t allowed to search travelers’ data stored in the cloud

When searching travelers’ mobile phones at the border, US Customs and Border Protection (CBP) officers do not have the authority to rifle through data stored solely on …

IBM Z
IBM reboots iconic mainframe: Encrypt data all the time, at any scale

IBM today unveiled IBM Z, the next generation of a transaction system capable of running more than 12 billion encrypted transactions per day. The new system also introduces an …

Kodi
Why Kodi boxes can pose a serious malware threat

When new streaming devices, such as the Amazon Firestick and Apple TV, were first introduced, many were intrigued by the ease by which they could watch “over the …

lens
Privacy, security concerns grow for wearables

While Google Glass was not the success Google wanted it to be, there is no doubt that the wearable camera market is growing. People may have not been comfortable with the fact …

CIA
How the CIA hacked wireless home routers

For many years, the CIA has had the capability to compromise a wide range of commercial wireless routers, and to monitor, control and manipulate the traffic passing through …

iStorage drives
iStorage introduces ultra-secure hard drives

iStorage launched of their new range of USB 3.1 HDDs and SSDs, consisting of the diskAshur, diskAshur SSD, diskAshur PRO, diskAshur PRO SSD and the diskAshur DT – all of …

healthcare
Healthcare industry continues to struggle with software security

67% of medical device manufacturers and 56% of healthcare delivery organizations (HDOs) believe an attack on a medical device built or in use by their organizations is likely …

Samsung Galaxy S8
Samsung Galaxy S8 iris scanner can be fooled with a printed photo

After demonstrating how easily Apple’s Touch ID can be fooled with a user fingerprint photographed from a glass surface, Chaos Computer Club (CCC) hacker …

HP E820
HP pushes out fix for keylogging audio driver in its laptops

Swiss security consultancy Modzero revealed on Thursday that a number of HP laptops contain an audio driver that logs users’ keystrokes and stores them in an unencrypted …

Cisco switch
Cisco patches leaked 0-day in 300+ of its switches

Cisco has plugged a critical security hole in over 300 of its switches, and is urging users to apply the patches as soon as possible because an exploit for it has been …

Don't miss

Cybersecurity news