hardware
Attackers compromise Cisco Web VPNs to steal login credentials, backdoor target networks
Another Cisco product is being targeted by attackers looking for a permanent way into the computer networks and systems of various organizations, Volexity researchers …
New Toshiba CMOS image sensor improves recognition and authentication
In recent years, mobile devices have adopted user authentication systems to protect access and information security. Password entry remains the most common, but finger print …
Pen-testing drone searches for unsecured devices
You’re sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer …
Huawei 3G routers rife with flaws
South Korean security researcher Pierre Kim has revealed today that fifteen Huawei 3G routers have a slew of serious vulnerabilities – RCE, XSS, CSRF, DoS, …
Wealth of personal data found on used electronics purchased online
Varying amounts and types of residual data have been found on used mobile devices, hard disk drives and solid state drives purchased online from Amazon, eBay and …
Car hacking via compromised car diagnostic tools
Car hacking is a topic that has received considerable attention from security researchers in the last year or so, and the general public and (hopefully) lawmakers are finally …
Too many vulnerable medical systems can be found online
How many critical medical systems can be found on the Internet, accessible to and hackable by remote attackers? According to security researchers Scott Erven and Mark Collao, …
Oysters tablet comes preinstalled with Trojanized Android firmware
“Keeping your mobile device free of malware requires intentional care, but sometimes even that is not enough. As Dr. Web researchers recently pointed out, a device you …
Silent Circle launches Blackphone 2, delivering business and personal privacy
Silent Circle has launched Blackphone 2 – its next-generation smartphone that delivers privacy and security. It provides full device encryption by default through harnessing …
CUJO: Plug-n-play protection for all devices
CUJO is a smart device that brings business level Internet security to guard all of your connected home devices. It’s simple to start with no installation necessary.You …
Killing computer infrastructures with a bang!
In an attempt to demonstrate how easy it would be for attackers to perform a high-voltage attack against a company’s computer infrastructure and take it down by damaging …
WD My Cloud NAS devices can be hijacked by attackers
Researchers with security consultancy VerSprite have unearthed several vulnerabilities in Western Digital’s My Cloud NAS product, which can be exploited by local and …