hardware
![Netgear R700](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105541/Netgear-R700-400x200.jpg)
Critical flaw opens Netgear routers to hijacking
Several Netgear router models can be easily hijacked by remote, unauthenticated attackers, CERT/CC has warned on Friday. The vulnerability that allows this takeover can be …
![Nintendo](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105622/nintendo-characters-400x200.jpg)
Nintendo offers up to $20,000 for bug info
Video game giant Nintendo has set up a bug bounty program through HackerOne’s platform, and is asking researchers to find and flag vulnerabilities in the Nintendo 3DS …
![Dedrone](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105654/dedrone-400x200.jpg)
Deutsche Telekom goes drone hunting
Drone popularity continues to rise rapidly as they become ever cheaper and more powerful. Easy availability and large payloads conspire to increase the potential for dangerous …
![BYOD](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110841/byod-400x200.jpg)
Employees rely largely on personally owned mobile devices in the workplace
Mobile device adoption in the workplace is not yet mature, found a recent survey from Gartner. Although 80 percent of workers surveyed received one or more corporate-issued …
![Fingbox](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105728/fingbox-400x200.jpg)
Fingbox: Network security and Wi-Fi troubleshooting
Fingbox allows you to secure and troubleshoot your home network. It plugs in to your existing router, alerting you when it senses anything out of the ordinary – from new …
![gear](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110730/gear-400x200.jpg)
New infosec products of the week: November 25, 2016
Anomali STAXX: Easy way to subscribe to any STIX/TAXII feed Anomali, provider of threat intelligence platforms, today announced the availability of Anomali STAXX, a free …
![iStorage diskAshur Pro](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111519/istorage-diskashur-pro-400x200.jpg)
Review: iStorage diskAshur Pro SSD
The iStorage diskAshur Pro SSD is the hard drive for users with security on their mind. This USB 3.0 device comes in various storage capacities, ranging from 128GB to 1TB, and …
![CPU](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105849/cpu-400x200.jpg)
Researchers set to work on malware-detecting CPUs
Adding hardware protections to software ones to block the ever-increasing onslaught of computer malware seems like a solid idea, and a group of researchers have just been …
![voting machine vulnerabilities](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105927/cylance-voting-vuln-400x200.jpg)
Exposing voting machine vulnerabilities
Cylance announced the successful exploitation of critical vulnerabilities in a common model of voting machine. The exploitation of these vulnerabilities was previously thought …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110832/cisco-400x200.jpg)
Cisco plugs critical hole in Prime Home management platform
Cisco has released nine security alerts on Wednesday, and among these are two for critical vulnerabilities in its ASR 900 Series routers and the Cisco Prime Home management …
![Icarus](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110038/icarus-400x200.jpg)
Icarus takes control of drones by impersonating their operators
Researcher Jonathan Andersson, a member of Trend Micro’s TippingPoint DVLabs, has demonstrated how a specialized hardware module dubbed Icarus can be used to hijack a …
![IoT world](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110329/iot-globe-400x200.jpg)
Common enterprise IoT devices are hackable in minutes
Common enterprise IoT devices pose an inherent risk to the overall security posture of organisations, according to ForeScout Technologies. Smart video conference systems “IoT …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints