Please turn on your JavaScript for this page to function normally.
Netgear R700
Critical flaw opens Netgear routers to hijacking

Several Netgear router models can be easily hijacked by remote, unauthenticated attackers, CERT/CC has warned on Friday. The vulnerability that allows this takeover can be …

Nintendo
Nintendo offers up to $20,000 for bug info

Video game giant Nintendo has set up a bug bounty program through HackerOne’s platform, and is asking researchers to find and flag vulnerabilities in the Nintendo 3DS …

Dedrone
Deutsche Telekom goes drone hunting

Drone popularity continues to rise rapidly as they become ever cheaper and more powerful. Easy availability and large payloads conspire to increase the potential for dangerous …

BYOD
Employees rely largely on personally owned mobile devices in the workplace

Mobile device adoption in the workplace is not yet mature, found a recent survey from Gartner. Although 80 percent of workers surveyed received one or more corporate-issued …

Fingbox
Fingbox: Network security and Wi-Fi troubleshooting

Fingbox allows you to secure and troubleshoot your home network. It plugs in to your existing router, alerting you when it senses anything out of the ordinary – from new …

gear
New infosec products of the week​: November 25, 2016

Anomali STAXX: Easy way to subscribe to any STIX/TAXII feed Anomali, provider of threat intelligence platforms, today announced the availability of Anomali STAXX, a free …

iStorage diskAshur Pro
Review: iStorage diskAshur Pro SSD

The iStorage diskAshur Pro SSD is the hard drive for users with security on their mind. This USB 3.0 device comes in various storage capacities, ranging from 128GB to 1TB, and …

CPU
Researchers set to work on malware-detecting CPUs

Adding hardware protections to software ones to block the ever-increasing onslaught of computer malware seems like a solid idea, and a group of researchers have just been …

voting machine vulnerabilities
Exposing voting machine vulnerabilities

Cylance announced the successful exploitation of critical vulnerabilities in a common model of voting machine. The exploitation of these vulnerabilities was previously thought …

Cisco
Cisco plugs critical hole in Prime Home management platform

Cisco has released nine security alerts on Wednesday, and among these are two for critical vulnerabilities in its ASR 900 Series routers and the Cisco Prime Home management …

Icarus
Icarus takes control of drones by impersonating their operators

Researcher Jonathan Andersson, a member of Trend Micro’s TippingPoint DVLabs, has demonstrated how a specialized hardware module dubbed Icarus can be used to hijack a …

IoT world
Common enterprise IoT devices are hackable in minutes

Common enterprise IoT devices pose an inherent risk to the overall security posture of organisations, according to ForeScout Technologies. Smart video conference systems “IoT …

Don't miss

Cybersecurity news