Please turn on your JavaScript for this page to function normally.
How will billions of devices impact the Privacy of Things?

The Internet of Things (IoT) will create the single largest, most chaotic conversation in the history of language. Imagine every human being on the planet stepping outside and …

Millions of smartphones, IoT devices risk compromise due to 3-year-old bug

Can you believe that an estimated 6.1 million smart phones, routers, and smart TVs are vulnerable to remote code execution attacks due to security bugs that have been fixed …

3G/4G cellular USB modems are full of critical security flaws, many 0-days

An analysis of popular 3G and 4G cellural USB modems and routers used around the world revealed a myriad of serious vulnerabilities in each of them.The SCADA Strange Love team …

New flash storage architecture capable of 1TB/s

Seagate and Newisys announced that 21 Newisys NSS-2601 with dual NSS-HWxEA Storage Server Modules deployed with Seagate’s SAS 1200.2 SSD drives can be combined in a single 42U …

The privacy risks of school technology tools

The Electronic Frontier Foundation (EFF) filed a complaint with the Federal Trade Commission (FTC) against Google for collecting and data mining school children’s personal …

Belkin’s N150 router sports multiple flaws, including default access credentials for telnet server

Belkin’s SOHO routers are not exactly a paragon of a secure device, so it shouldn’t come as a surprise that, once again, a security researcher has unearthed a …

Windows machines stop trusting Dell’s two unconstrained root CA certs

Microsoft has updated the Certificate Trust list for all supported releases of Microsoft Windows so that the two digital certificates (complete with inadvertently disclosed …

More than 900 embedded devices share hard-coded certs, SSH host keys

Embedded devices of some 50 manufacturers has been found sharing the same hard-coded X.509 certificates (for HTTPS) and SSH host keys, a fact that can be exploited by a …

MagSpoof: A device that spoofs credit cards, disables chip-and-PIN protection

Hacker and security researcher Samy Kamkar, who’s noted for being the author of the first Web 2.0 worm, creating zombie cookies, and USBdriveby, has now come out with a …

Another root CA cert with key found on Dell’s machines

The main piece of news on Monday was that Dell’s desktop PCs and laptops shipped since August 2015 contain a root CA certificate (eDellRoot) complete with the private …

The worst data disasters from 2015

What’s stronger than a speeding locomotive and can survive the heat of a fire? Data. The device that contains that data is a different story. Each year, Kroll Ontrack – which …

Mainframe access
Inside the largely unexplored world of mainframe security

The security of mainframe computers – the so-called “big iron”, which is mainly used by large organizations for critical applications, bulk data and …

Don't miss

Cybersecurity news