Please turn on your JavaScript for this page to function normally.
Furby
Should you risk buying your child smart toys currently on offer?

As the end-of-the-year holiday season approaches, many security researchers, consumer groups and even governments warn against buying specific products or, at least, to make …

Facepalm
Sites using session replay scripts leak sensitive user data

When we enter sensitive information – our names, passwords, payment card information, medical information, what have you – into websites, we do it with the …

Phishing is a greater threat to users than keyloggers and third-party breaches

When it comes to loosing access to their accounts, phishing is a greater threat to users than keyloggers and third-party breaches, researchers have found. How many valid …

phishing
Researchers analyze 3,200 unique phishing kits

Most phishing sites are quickly detected and access to them is blocked, but not matter how fast the “takedown” happens, the number of victims is still large enough …

LG HomeHack
Researchers turn LG’s Hom-Bot vacuum cleaner into a real-time spying device

Check Point researchers have discovered a vulnerability in LG’s smart home infrastructure that could have allowed hackers to take over the legitimate user’s account and, …

Pixie
Camera-based, single-step two-factor authentication resilient to pictionary, shoulder surfing attacks

A group of researchers from Florida International University and Bloomberg LP have created Pixie, a camera-based two-factor authentication system that could end up being a …

wireless
WPA2 weakness allows attackers to extract sensitive info from Wi-Fi traffic

WPA2, a protocol that secures modern protected Wi-Fi networks, sports serious weaknesses that can allow attackers to read and capture information that users believe to be …

Laptop
The privacy implications of email tracking

Emails are a widely used means for third parties to tie your email address to your activities across the web, Princeton University researchers have discovered. The extent of …

Stack Overflow
Secure coding in Java: Bad online advice and confusing APIs

For programmers and software developers, the Internet forums provide a great place to exchange knowledge and seek answers to concrete coding conundrums. Alas, they are not …

Deloitte
After hack, security researchers probe Deloitte’s security posture

It’s difficult – if not impossible – for any organization to keep their networks and systems completely safe from knowledgeable, well-resourced and …

Phone unlock pattern
Android unlock patterns are a boon for shoulder surfing attackers

The “swiping” unlock patterns typical for Android devices are considerably easier for attackers to discern than PIN combinations. In fact, after only one …

camera
Using security cameras and infrared light to extract data from air-gapped networks

Researchers have demonstrated that it’s possible for attackers to covertly exfiltrate data from and send data into an air-gapped network by using the infrared light …

Don't miss

Cybersecurity news