Please turn on your JavaScript for this page to function normally.
USB Killer 2.0: A harmless-looking USB stick that destroys computers

Plugging in random USB sticks in your computer has never been more dangerous, as a researcher who goes by the name Dark Purple has demonstrated his new device: USB Killer …

Global Internet experts reveal plan for more secure, reliable Wi-Fi routers

In a letter submitted to the Federal Communications Commission (FCC), Dave Täht, co-founder of the Bufferbloat Project, and Dr. Vinton Cerf, co-inventor of the Internet, along …

Authentication bypass flaw in Netgear SOHO routers exploited in the wild

A critical security vulnerability affecting nine Netgear router models is being exploited in the wild. The flaw that the attackers took advantage of allowed them to access the …

Attackers compromise Cisco Web VPNs to steal login credentials, backdoor target networks

Another Cisco product is being targeted by attackers looking for a permanent way into the computer networks and systems of various organizations, Volexity researchers …

New Toshiba CMOS image sensor improves recognition and authentication

In recent years, mobile devices have adopted user authentication systems to protect access and information security. Password entry remains the most common, but finger print …

Pen-testing drone searches for unsecured devices

You’re sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer …

Huawei 3G routers rife with flaws

South Korean security researcher Pierre Kim has revealed today that fifteen Huawei 3G routers have a slew of serious vulnerabilities – RCE, XSS, CSRF, DoS, …

Wealth of personal data found on used electronics purchased online

Varying amounts and types of residual data have been found on used mobile devices, hard disk drives and solid state drives purchased online from Amazon, eBay and …

Car hacking via compromised car diagnostic tools

Car hacking is a topic that has received considerable attention from security researchers in the last year or so, and the general public and (hopefully) lawmakers are finally …

Too many vulnerable medical systems can be found online

How many critical medical systems can be found on the Internet, accessible to and hackable by remote attackers? According to security researchers Scott Erven and Mark Collao, …

Oysters tablet comes preinstalled with Trojanized Android firmware

“Keeping your mobile device free of malware requires intentional care, but sometimes even that is not enough. As Dr. Web researchers recently pointed out, a device you …

Silent Circle launches Blackphone 2, delivering business and personal privacy

Silent Circle has launched Blackphone 2 – its next-generation smartphone that delivers privacy and security. It provides full device encryption by default through harnessing …

Don't miss

Cybersecurity news