'Capture' your IoT devices and improve their security
Cyberattacks on IoT devices have shown no signs of slowing as more and more vulnerabilities become known.
Aug 17, 2021
0
473
Security
Cyberattacks on IoT devices have shown no signs of slowing as more and more vulnerabilities become known.
Aug 17, 2021
0
473
Engineering
We are frequently reminded of how vulnerable our health and safety are to threats from nature or those who wish to harm us.
May 14, 2021
0
40
Security
After Apple's recent release of the AirTag for locating misplaced items, security researchers have just succeeded in jailbreaking the new tagging device. The German researcher, stacksmashing, reported hacking into, dumping ...
May 11, 2021 weblog
0
132
Hardware
Check Point Research (CPR) has identified a security flaw in the Qualcomm chip of the mobile station modems (MSM) used in cellular communication for over 40 percent of phones worldwide. If exploited, a hacker could use the ...
May 7, 2021 report
0
79
Software
The Record, the news branch of the threat intelligence company Recorded Future, has reported that GitHub is currently looking into multiple attacks against its cloud infrastructure. These attacks have enabled cybercriminals ...
Apr 6, 2021 report
1
84
Consumer & Gadgets
Apple announced this week that it will begin shipping out specially configured Security Research Device iPhones to researchers so that they can probe for vulnerabilities without interference from standard iPhone security ...
Jul 23, 2020 report
0
56
Hardware
What does a chip giant gotta do? ZombieLoad won't die and that is not to be allowed. Intel has forced out a third patch, said reports.
Jan 30, 2020 weblog
1
53
Security
A new computer processor architecture developed at the University of Michigan could usher in a future where computers proactively defend against threats, rendering the current electronic security model of bugs and patches ...
May 2, 2019
0
648
Computer Sciences
It sounds like a plot out of a spy novel, with a touch of cyberpunk: An agent approaches a secure location, protected by a facial recognition system, accessible only to a head of state or CEO. Flashing an unusually shaped ...
Apr 24, 2019
1
52
Security
Security researchers this week confirmed that they spotted new activity by hackers using "Triton" malware capable of doing real-world damage to oil, gas or water plants.
Apr 12, 2019
0
196