hardware
Pre-loaded malware on new Android phones is on the rise
The danger of having your Android handset come preloaded with malware is rising, especially if you live in Asia and Africa and are on the market for a cheap, low-level phone. …
Cybersecurity concept for unmanned systems
The University of Virginia School of Engineering and Applied Science Department of Systems and Information Engineering announced the success of an early-stage demonstration to …
Hacking RFID payment cards made possible with Android app
We recently encountered a high-risk Android app detected as ANDROIDOS_STIP.A in Chile. This app, found distributed through forums and blogs, can be used to hack into the …
Hikvision DVRs sporting bugs that allow device hijacking
A while back, SANS ISC CTO Johannes Ullrich discovered that cybercrooks were targeting Hikvision Digital Video Recorders (DVRs) in order to infect them with bitcoin-mining …
New Synology NAS optimized for encryption and intensive tasks
Synology introduced its newest Plus series DiskStations, the DS1515+ and DS1815+. Both multi-bay NAS servers are designed to facilitate intensive data exchange, collaboration, …
ReadyNAS OS offers 5 levels of data protection
NETGEAR is releasing a new version of its ReadyNAS operating system for its ReadyNAS family of desktop and rack-mount NAS devices. ReadyNAS OS 6.2 offers improvements in data …
Only 47% of IT pros are confident in their hardware configurations
Respondents of a new Tripwire survey were asked about the level of confidence they have in their application of foundational security controls, including hardware and software …
New SDK for Raspberry Pi protects embedded software
Wibu-Systems is about to introduce a Raspberry Pi version of its CodeMeter software protection platform called Compute Module. A CodeMeter SDK for the Raspberry Pi will enable …
Linksys SOHO router owners urged to patch multiple vulnerabilities
Owners of a number of Linksys small office/home office routers have been urged last week to update their device’s firmware in order patch two vulnerabilities, one of …
Hacking and Penetration Testing with Low Power Devices
This book is primarily intended for penetration testers who want to widen their skill set to include the knowledge of how to perform testing with small, low-powered devices …
2FA: Google offers physical alternative to verification codes
Google is offering an alternative second factor for its two-step account verification option, one that has the additional advantage of thwarting phishing attacks. It’s …
Linksys releases high performance 4X4 wireless AC router
Linksys unveiled its first 4×4 Wireless AC router aimed at households with multiple internet users as well as single users who use the internet for high bandwidth …
Featured news
Resources
Don't miss
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics
- How to use Hide My Email to protect your inbox from spam
- Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891)
- DeepSeek’s popularity exploited by malware peddlers, scammers