Please turn on your JavaScript for this page to function normally.
Cybersecurity concept for unmanned systems

The University of Virginia School of Engineering and Applied Science Department of Systems and Information Engineering announced the success of an early-stage demonstration to …

Hacking RFID payment cards made possible with Android app

We recently encountered a high-risk Android app detected as ANDROIDOS_STIP.A in Chile. This app, found distributed through forums and blogs, can be used to hack into the …

Hikvision DVRs sporting bugs that allow device hijacking

A while back, SANS ISC CTO Johannes Ullrich discovered that cybercrooks were targeting Hikvision Digital Video Recorders (DVRs) in order to infect them with bitcoin-mining …

New Synology NAS optimized for encryption and intensive tasks

Synology introduced its newest Plus series DiskStations, the DS1515+ and DS1815+. Both multi-bay NAS servers are designed to facilitate intensive data exchange, collaboration, …

ReadyNAS OS offers 5 levels of data protection

NETGEAR is releasing a new version of its ReadyNAS operating system for its ReadyNAS family of desktop and rack-mount NAS devices. ReadyNAS OS 6.2 offers improvements in data …

Only 47% of IT pros are confident in their hardware configurations

Respondents of a new Tripwire survey were asked about the level of confidence they have in their application of foundational security controls, including hardware and software …

New SDK for Raspberry Pi protects embedded software

Wibu-Systems is about to introduce a Raspberry Pi version of its CodeMeter software protection platform called Compute Module. A CodeMeter SDK for the Raspberry Pi will enable …

Linksys SOHO router owners urged to patch multiple vulnerabilities

Owners of a number of Linksys small office/home office routers have been urged last week to update their device’s firmware in order patch two vulnerabilities, one of …

Ideas
Hacking and Penetration Testing with Low Power Devices

This book is primarily intended for penetration testers who want to widen their skill set to include the knowledge of how to perform testing with small, low-powered devices …

2FA: Google offers physical alternative to verification codes

Google is offering an alternative second factor for its two-step account verification option, one that has the additional advantage of thwarting phishing attacks. It’s …

Linksys releases high performance 4X4 wireless AC router

Linksys unveiled its first 4×4 Wireless AC router aimed at households with multiple internet users as well as single users who use the internet for high bandwidth …

McAfee Next Generation Firewall integrates with key technologies

McAfee, part of Intel Security, announced the latest release of McAfee Next Generation Firewall, which now integrates with several key McAfee solutions and technologies, …

Don't miss

Cybersecurity news