News

myanmar

A Swedish mobile forensic tools developer was selling its solutions to the Myanmar regime.The company has stated that they haveโ€ฆ

|
Last updated September 25, 2021
LifeLock

LifeLock released a report stating that a vulnerability in the core API of its website could have leaked user informationโ€ฆ

|
Last updated September 25, 2021
Bug Bounty Hunter Ryan Stevenson Caught Offering Doxing Services

Ryan Stevenson is a prominent bug bounty hunter responsible for reporting a number of security holes in major websites. Stevensonโ€ฆ

|
Last updated September 25, 2021
Healthcare industry, a target for cyberattackers

A mix of healthcare IoT devices, unpartitioned networks, and reliance on legacy systems makes healthcare systems targets for attackers. Humanโ€ฆ

|
Last updated September 24, 2021
The IoT Nightmare - Attackers Can Compromise Apps, Steal Credentials

Barracuda Labs runs remote IoT attack via web and mobile apps, with no product contact Vulnerabilities allow for credential theft,โ€ฆ

|
Last updated September 24, 2021
hichip-camera-with-uid

iLnkP2P plagued by remote device ID guessing and cleartext data traffic interception. The number of IoT devices that are affectedโ€ฆ

|
Last updated September 24, 2021
samsung_oled_tv

The Samsung US Support team has tweeted on how to check your smart TVs for viruses. The tweet was promptlyโ€ฆ

|
Last updated September 24, 2021
Avast Logo

Avast carried out the most extensive IoT study ever, by using data from 83 million devices from around the world.โ€ฆ

|
Last updated September 24, 2021
smart light bulb

Security researchers found a way to exfiltrate user data from a home network by abusing infrared light on smart bulbs.โ€ฆ

|
Last updated September 24, 2021
Torrent Encryption Guide

A team of researchers has found out that many devices use a common factor in the RSA key generation process.โ€ฆ

|
Last updated September 24, 2021
philips_hue

Philips Hue lamps are vulnerable to exploitation which can lead to network infiltration. Hackers could follow certain steps to triggerโ€ฆ

|
Last updated September 24, 2021
The IoT Nightmare - Attackers Can Compromise Apps, Steal Credentials

IoT security in the United Kingdom will soon be underpinned by special legislation. The manufacturers of the devices will nowโ€ฆ

|
Last updated September 24, 2021
label featured

The IEEE hopes to introduce an IoT security label that will help consumers make a safe choice. The label wasโ€ฆ

|
Last updated September 24, 2021
lilin dvr

Actors are exploiting a series of zero-day flaws in LILIN devices and planting botnets in them. The reason behind itโ€ฆ

|
Last updated September 24, 2021
robotic vacuum cleaner

Researchers find ways to intercept video feed from smart vacuum cleaners, and even take them over. One of the mostโ€ฆ

|
Last updated September 24, 2021
camera

A team of researchers has experimented with the potential for domestic abuse and harassment via IoT flaws. The students haveโ€ฆ

|
Last updated September 24, 2021
ripple20

A set of 19 vulnerabilities named โ€œRipple20โ€ is punching security holes in millions of IoT devices. The scope of theโ€ฆ

|
Last updated September 24, 2021
hacker botnet

A new version of Mirai adds nine new exploits, including one for the Comtrend VR-3033. The โ€œCVE-2020-10173โ€ has crucial implications,โ€ฆ

|
Last updated September 24, 2021
security camera

An undisclosed โ€œKasaโ€ cam model is vulnerable to account take over due to insecure practices. The main issue is thatโ€ฆ

|
Last updated September 24, 2021
IP camera

A researcher has tested 10 IP camera apps, and only two of them demonstrated adequate security levels. The other eightโ€ฆ

|
Last updated September 24, 2021
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: