Please turn on your JavaScript for this page to function normally.
Superfish not the only app using Komodia’s SSL-busting code

As Lenovo backtracked on its initial position that the Superfish adware pre-installed on some of its notebooks is not a security danger, and released a security advisory about …

Flaw makes Cisco routing hardware vulnerable to DoS attacks

A serious vulnerability affecting the software of some of Cisco’s routing hardware systems for telecommunications and Internet service providers could be exploited to …

Over 250,000 home routers sport same SSH keys, warns researcher

With a simple search, John Matherly, the creator of Shodan, has discovered with it more than 250,000 routers that share the same SSH key, meaning they also share the same …

New Android Trojan fakes device shut down, spies on users

A new Android Trojan that tricks users into believing they have shut their device down while it continues working, and is able to silently make calls, send messages, take …

Lenovo computers come with pre-installed adware and MITM proxy

If you have recently bought a new Lenovo computer, you’re in for a nasty surprise: the company has been shipping them with pre-installed adware. And, what’s even …

Flaw in Netgear Wi-Fi routers exposes admin password, WLAN details

A number of Netgear home wireless routers sport a vulnerability that can be misused by unauthenticated attackers to obtain the administrator password, device serial number, …

Equation Group: Cyber espionage, compromising HDD firmware, sophisticated malware

For several years, the Kaspersky Lab Global Research and Analysis Team (GReAT) has been monitoring more than 60 advanced threat actors responsible for cyber-attacks worldwide. …

Car hacking and hijacking is too easy, report says

A report released on Monday by US Senator Edward Markey has confirmed what we already suspected: automobile manufacturers have yet to effectively deal with the threat of …

Be careful when talking in front of a Samsung SmartTV

Owners of Samsung SmartTVs that use its Voice Recognition feature to control the device should be aware that everything they say in front of their smart television set may end …

D-Link routers vulnerable to DNS hijacking

At least one and likely more D-Link routers as well as those of other manufacturers using the same firmware are vulnerable to remote changing of DNS settings and, effectively, …

Hijacking drones with malware

A recent incident at the White House showed that small aerial vehicles (drones) present a specific security problem. While in this particular case the actual danger turned out …

Researchers create inexpensive versions of NSA’s spying tools

ShmooCon, the hacker convention that welcomes individuals interested in all aspects of computer and information security, was held last week in Washington, D.C. Among the …

Don't miss

Cybersecurity news