Please turn on your JavaScript for this page to function normally.
cyber microscope
Cyber microscope enables advanced security anomaly detection

Lewis Rhodes Labs introduced the Cyber Microscope for faster and more accurate anomaly detection. The new product is based upon a Cyber Optimized Neuromorphic Processor that …

ASUS
FTC forces Asus to improve router security

The Federal Trade Commission (FTC) is actively trying to make sure that companies secure the software and devices that they provide to consumers, and Tuesday’s …

ICLOAK Pro
Review: ICLOAK Pro

Maintaining digital security and online privacy is difficult. As things move(d) online, cyber attacks of different kinds and magnitudes are constantly being mounted against …

MouseJack
MouseJack: Remote exploitation via radio frequencies

Bastille has uncovered a massive vulnerability in wireless mice and keyboards that leaves billions of PC’s and millions of networks vulnerable to remote exploitation via radio …

Critical bug found in Cisco ASA products, attackers are scanning for affected devices

Several Cisco Adaptive Security Appliance (ASA) products – appliances, firewalls, switches, routers, and security modules – have been found sporting a flaw that …

Drone
Eagles vs drones: A low-tech solution for a high-tech problem?

The Dutch National Police is aware that the use of drones – and the number of drones incidents – is only going to increase as time goes by. So, they are trying to …

Cisco plugs hole in firewall devices that could lead to device hijacking

Cisco has released a firmware update that plugs a critical, easy-to-exploit vulnerability that could allow a remote attacker to take control of the company’s RV220W …

match fire
Centene Corp misplaces hard drives with sensitive info of 95,000 customers

US-based healthcare service provider Centene somehow managed to lose six hard drives containing sensitive data of some 95,000 customers. “Centene has determined the hard …

Fortinet
SSH backdoor found in more Fortinet devices, exploit attempts spotted in the wild

In case you missed it, Fortinet announced last week that the recently discovered FortiOS SSH backdoor – or, as they call it, “a management authentication …

abstract
Unknown attackers are infecting home routers via dating sites

Damballa researchers have spotted an active campaign aimed at infecting as many home routers possible with a worm. A variant of the TheMoon worm, it works by taking advantage …

Doctor
Cybersecurity recommendations for medical device manufacturers

Cybersecurity threats to medical devices are a growing concern. The exploitation of cybersecurity vulnerabilities presents a potential risk to the safety and effectiveness of …

Vectra Networks webcam
Cheap web cams can open permanent, difficult-to-spot backdoors into networks

They might seems small and relatively insignificant, but cheap wireless web cams deployed in houses and offices (and connected to home and office networks) might just be the …

Don't miss

Cybersecurity news