Please turn on your JavaScript for this page to function normally.
Ubee EVW3226
Flaws in Ubee router can facilitate attacks on connected networks

Researchers have discovered five critical vulnerabilities in Ubee EVW3226, a VoIP cable modem router used by operators across Europe, which can be exploited to compromise the …

KeySweeper
FBI warns about keyloggers disguised as USB device chargers

A private industry notification issued by the FBI in late April may indicate that keyloggers disguised as USB device chargers have been fund being used in the wild. The …

ATM
Criminals turn entire ATMs into skimmers

As if withdrawing money from an ATM wasn’t dangerous enough, researchers discovered that Russian-speaking Skimer group forces ATMs to assist them in stealing users’ …

Internet of Fail
Internet of Fail: How modern devices expose our lives

Should you sync your family’s calendar to your refrigerator or have it display photos? Samsung believes you should. They also think you need cameras that display the …

market
Global security appliance market continues to grow

The global security appliance market is projected to grow at a CAGR of more than 11% by 2020. Global security appliance market by large enterprises Technavio predicts the …

IoT
Consumer concerns of a connected world

While consumers see the tangible benefit of IoT (just 1 consumer in 10 says a world of connected devices won’t deliver such value), more than half also harbour concerns …

AT&T IoT report
Commonly used IoT devices vulnerable to privacy theft

A technical investigation by Bitdefender has discovered that four commonly used Internet of Things (IoT) consumer devices are vulnerable to attack. The analysis reveals that …

ADAC test
Cheap radio attack can be used to unlock and steal 24 car models

A group of researchers from ADAC, the largest automobile club in Germany and Europe, have demonstrated how the keyless “comfort locking” system used by most …

Insider threat protection with the DB Networks DBN-6300

Many high profile database breaches have resulted from the abuse of legitimate logon credentials. Identifying these apparent “insider threats” requires a new …

Android Marshmallow
Hotel replaces light switches with insecure Android tablets

Here’s another documented instance for the “insecure Internet of Things” annals, courtesy of CoreOS security developer Matthew Garrett. Garrett, who’s …

point
Bug in surveillance app opens Netgear NAS systems to compromise

A security vulnerability in the ReadyNAS Surveillance Application can be exploited by unauthenticated, remote attackers to gain root access to Netgear NAS systems, Sysdream …

Lockheed Martin
Microfluidic cooling turns down the heat on high-tech equipment

Thousands of electrical components make up today’s most sophisticated systems – and without innovative cooling techniques, those systems get hot. Lockheed Martin is …

Don't miss

Cybersecurity news