hardware
Commonly used IoT devices vulnerable to privacy theft
A technical investigation by Bitdefender has discovered that four commonly used Internet of Things (IoT) consumer devices are vulnerable to attack. The analysis reveals that …
Cheap radio attack can be used to unlock and steal 24 car models
A group of researchers from ADAC, the largest automobile club in Germany and Europe, have demonstrated how the keyless “comfort locking” system used by most …
Insider threat protection with the DB Networks DBN-6300
Many high profile database breaches have resulted from the abuse of legitimate logon credentials. Identifying these apparent “insider threats” requires a new …
Hotel replaces light switches with insecure Android tablets
Here’s another documented instance for the “insecure Internet of Things” annals, courtesy of CoreOS security developer Matthew Garrett. Garrett, who’s …
Bug in surveillance app opens Netgear NAS systems to compromise
A security vulnerability in the ReadyNAS Surveillance Application can be exploited by unauthenticated, remote attackers to gain root access to Netgear NAS systems, Sysdream …
Microfluidic cooling turns down the heat on high-tech equipment
Thousands of electrical components make up today’s most sophisticated systems – and without innovative cooling techniques, those systems get hot. Lockheed Martin is …
New Seagate 10GB/s SSD drive ideal for hyperscale data centers
Seagate unveiled a production-ready unit of the fastest single SSD demonstrated to date, with throughput performance of 10 GB/s. The unit, which is expected to be released …
Cisco removes weak default static credentials from its switches
Cisco has released on Wednesday a bucketload of software updates for a wide variety of its products, fixing vulnerabilities of different types and severity. But one is deemed …
Can poorly designed embedded devices kill?
The industry is not taking safety and security seriously enough, according to the Barr Group, who conducted a survey to better understand the state of safety- and …
Cyber microscope enables advanced security anomaly detection
Lewis Rhodes Labs introduced the Cyber Microscope for faster and more accurate anomaly detection. The new product is based upon a Cyber Optimized Neuromorphic Processor that …
FTC forces Asus to improve router security
The Federal Trade Commission (FTC) is actively trying to make sure that companies secure the software and devices that they provide to consumers, and Tuesday’s …
Review: ICLOAK Pro
Maintaining digital security and online privacy is difficult. As things move(d) online, cyber attacks of different kinds and magnitudes are constantly being mounted against …