Please turn on your JavaScript for this page to function normally.
power meter
ICS-CERT warns of remotely exploitable power meter flaws

Two remotely exploitable vulnerabilities, one of which can lead to remote code execution, have been found in Schneider Electric’s ION Power Meter products and FENIKS PRO Elnet …

IoT Village
IoT Village uncovers 47 security vulnerabilities across 23 devices

New dangers in both home security and municipal power facilities were revealed as the results of the 2nd Annual IoT Village, held at DEF CON 24 in Las Vegas. More than 47 new …

Google Nexus
Hack a Nexus from afar, get $200,000

Google has issued a challenge to bug hunters around the world: find a vulnerability or bug chain that achieves remote code execution on multiple Android devices knowing only …

IoT
Organization must modify the network access policy to address IoT devices

By 2020, 21 billion of Internet of Things (IoT) devices will be in use worldwide. Of these, close to 6 percent will be in use for industrial IoT applications. However, IT …

D-Link NAS
XSS flaw in D-Link NAS devices allows attackers to mess with your data

Security researcher Benjamin Daniel Mussler has unearthed an XSS flaw affecting seven D-Link NAS devices – a flaw which could allow attackers to access the devices and …

Car
Automotive security: How safe is a next-generation car?

The vehicles we drive are becoming increasingly connected through a variety of technologies. Features such as keyless entry and self-diagnostics are becoming commonplace. …

chip
Researchers design a chip that checks for sabotage

With the outsourcing of microchip design and fabrication a worldwide, $350 billion business, bad actors along the supply chain have many opportunities to install malicious …

Juniper Networks
Implant leaked by Shadow Brokers targets Juniper’s NetScreen firewalls

Juniper Networks has become the latest company to acknowledge that one of the implants leaked by the Shadow Brokers targets some of their products. Cisco and Fortinet did the …

iStorage datAshur Pro
Review: iStorage datAshur Pro

Whenever I travel, I take data I might need with me on a secure USB flash drive. Ages ago, I would encrypt these files with GPG and move them to a generic USB drive. After …

Compromising Linux virtual machines via FFS Rowhammer attack

A group of Dutch researchers have demonstrated a variant of the Rowhammer attack that can be used to successfully compromise Linux virtual machines on cloud servers. The Flip …

magnify
New method for detecting hardware Trojans

Modern computer chips are made up of hundreds of millions – often billions – of transistors. Such complexity enables the smartphone in your back pocket to perform all manner …

Critical infrastructure
It’s time to replace firewalls in industrial network environments

Waterfall Security Solutions announced the expansion of its stronger-than-firewall solution portfolio for industrial control systems and critical infrastructure sites. …

Don't miss

Cybersecurity news