vulnerability
![smart city building light](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104005/smart-city-400x200.jpg)
Smart cities are exposed to old-school threats
Spurred by the false alarm that made Hawaii residents fear for their lives earlier this year, IBM X-Force Red and Threatcare researchers have decided to test several smart …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110026/healthcare-400x200.jpg)
OpenEMR vulnerabilities put patients’ info, medical records at risk
A slew of vulnerabilities in OpenEMR allowed attackers to access random patients’ health records, view data from a target database, escalate their privileges on the …
![HP](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194736/hp-400x200.jpg)
HP plugs critical RCE flaws in InkJet printers
HP has plugged two critical vulnerabilities (CVE-2018-5924, CVE-2018-5925) affecting many of its InkJet printers and is urging users to implement the provided firmware updates …
![Monero](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102212/monero-400x200.jpg)
Compromised MikroTik routers power extensive cryptojacking campaign
A massive cryptojacking campaign that relies on compromised MikroTik routers serves users with pages injected with the Coinhive mining script. It seems that the attacker …
![prison](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100503/prison-400x200.jpeg)
Idaho inmates hacked prison system to add money to their accounts
364 inmates at five correctional facilities in Idaho have managed to add nearly a quarter million dollars worth of credit to their JPay accounts by exploiting a vulnerability …
![Samsung SmartHub](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100510/samsung_smarthub-400x200.jpg)
Samsung SmartThings Hub vulnerabilities allow attackers inside your home
Cisco Talos researchers have unearthed 20 vulnerabilities in the Samsung SmartThings Hub that could be leveraged by attackers to monitor, control and interfere with devices …
![vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105327/vulnerability-400x200.jpg)
Same web-based vulnerabilities still prevalent after nine years
Analysis of vulnerabilities discovered by NCC Group researchers over the last nine years found that instances of common web-based vulnerabilities have largely refused to fall …
![Swann](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100516/swann-400x200.jpg)
Swann security cameras vulnerable to spying hack
Researchers have unearthed a security flaw in a Swann security camera that allows attackers to spy on the video and audio feed of anyone’s camera. Swann SWWHD-Intcam is …
![Bluetooth](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103157/bluetooth1-400x200.jpg)
Bluetooth vulnerability allows snooping of traffic between paired devices
Researchers Eli Biham and Lior Neumann have discovered a vulnerability in two Bluetooth features that could be exploited by attackers to gain a man-in-the-middle position and …
![bug](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101615/bug-400x200.jpg)
Exploring the dynamics of the attacker economy
Global software companies are increasingly turning to attackers for help identifying security vulnerabilities in their offerings – and they’re not the only ones. Conservative …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101404/cisco-400x200.jpg)
Cisco plugs serious flaws in Policy Suite, SD-WAN, and Nexus switches
Cisco has issued another batch of fixes, plugging a number of critical and high severity holes in its Policy Suite, SD-WAN, and Nexus products. Cisco Policy Suite Users of the …
![Polar Flow](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100607/polar_flow-400x200.jpg)
Fitness app Polar Flow reveals home addresses of soldiers, spies
Polar Flow can reveal sensitive information about the lives of users, including intelligence agents, embassy workers, military men and women, workers at nuclear weapons …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?