vulnerability
Your smartwatch can give away your payment card’s PIN code
Smartwatches can be a perfectly useful and handy wearable device for some users, but it’s good to keep in mind that using them might mean opening yourself to an …
Fortinet says backdoor found in FortiOS is “a management authentication issue”
Fortinet, the company whose enterprise network security offerings include the popular FortiGate firewall platform, has issued a statement regarding a security issue that has …
Google researchers finds critical flaws in Trend Micro AV solution
If you are using Trend Micro’s Maximum Security 10 solution for Windows, you might want to update it to the latest available version as soon as possible. If you …
Drupal moves to fix flaws in update process
After IOActive researcher Fernando Arnaboldi publicly revealed three crucial vulnerabilities in Drupal’s update process last Thursday, the Drupal Security Team published …
General Motors invites hackers to report security flaws in their cars
General Motors has started a bug bounty program and has invited security researchers to report information on security vulnerabilities affecting the company’s products …
EZCast TV streaming stick leaves home networks vulnerable to attack
Check Point researchers have discovered a vulnerability in the EZCast TV streaming stick that enables hackers to take full control of home networks. EZCast, which has five …
Bugs in Drupal’s update process could lead to backdoored updates, site compromise
Drupal’s update process is deeply flawed, says IOActive researcher Fernando Arnaboldi. He recently discovered three separate flaws in it, the worst of which could be …
HTTPS Bicycle attack reveals password length, allows easier brute-forcing
Dutch security researcher Guido Vranken has come up with a new attack that could allow attackers to discover the length of a user’s password – and therefore make …
Flaw in Comcast’s home security system lets burglars in without triggering alarm
Rapid7 researcher Phil Bosco has discovered a crucial flaw in the Comcast XFINITY Home Security system, which can be easily exploited by burglars to enter homes without …
Cisco Jabber flaw allows MitM attackers to wiretap communications
A vulnerability in Cisco’s Jabber client for Windows can be exploited by attackers to wiretap communications, steal user credentials, and to tamper with messages sent …
The Tor Project announces bug bounty program
Representatives of the Tor Project, the non-profit organization that maintains the software needed for using the Tor anonymity network and operates the Onion network, have …
ISC’s infocon turns yellow to reflect critical impact of Juniper backdoors
SANS Institute’s Internet Storm Center has raised its infocon status – the status of the condition of the Internet infrastructure – from green to yellow, …