admin

2441 Posts

Adobe Patches Vulnerabilities in Connect, Reader Mobile

Adobe on Tuesday informed customers that it has patched vulnerabilities in its Reader Mobile and Connect products, but none of them appears too...

NETGEAR Router, WD NAS Device Hacked on First Day of Pwn2Own Tokyo 2020

Bug bounty hunters hacked a NETGEAR router and a Western Digital network-attached storage (NAS) device on the first day of the Zero Day...

Recent WebLogic Vulnerability Likely Exploited by Ransomware Operators

At least one ransomware operator appears to have added to their arsenal an exploit for a recently patched vulnerability in Oracle WebLogic. Tracked as...

Routers, NAS Devices, TVs Hacked at Pwn2Own Tokyo 2020

Bug bounty hunters have hacked routers, network-attached storage (NAS) devices and smart TVs at the Zero Day Initiative’s Pwn2Own Tokyo 2020 hacking competition. Due...

PLATYPUS: Hackers Can Obtain Crypto Keys by Monitoring CPU Power Consumption

Researchers have disclosed the details of a new side-channel attack method that can be used to obtain sensitive information from a system by...

Let’s Encrypt Warns Some Android Users of Compatibility Issues

Let’s Encrypt has warned users whose devices are running older versions of Android that they may start getting errors next year when visiting...

New side-channel attacks allow access to sensitive data on Intel CPUs – Help Net Security

An international team of security researchers is presenting new side-channel attacks, which use fluctuations in...

7 coding and STEM toys every kid will want

In our tech-savvy world, toys that teach computer coding and STEM skills are must-haves. ...

FTC Says Zoom Misled Users on Its Security for Meetings

Federal regulators are requiring Zoom to strengthen its security in a proposed settlement of allegations that the video conferencing service misled users about...

Flaws in PcVue SCADA Product Can Facilitate Attacks on Industrial Organizations

Researchers found several potentially serious vulnerabilities in the PcVue SCADA/HMI solution developed by France-based ARC Informatique, including flaws that can allow an attacker...

Phishing, deepfakes, and ramsomware: How coronavirus-related cyberthreats will persist in 2021

The pandemic and 5G speed create wider attack capabilities. Phishing emails and other threats will...

EU Agrees on Tighter Rules for Surveillance Tech Exports

The European Union on Monday agreed to tighten up rules for the sale and export of cybersurveillance technology. EU lawmakers and the European Council...

Latest articles

BlackBerry expands Baidu partnership to take autonomous driving to a higher gear

The partnership expansion focuses on automotive safety as autonomous driving capabilities proliferate in the years...

Google Warning: North Korean Gov Hackers Targeting Security Researchers

Google late Monday raised the alarm about a “government-backed entity based in North Korea” targeting -- and hacking into -- computer systems belonging...

South Carolina County Suffers Weekend Cyberattack

A coastal South Carolina county says hackers broke into its computer network over the weekend. A statement from Georgetown County’s local government Monday said...

Open source magic solves a months-long problem in 20 minutes

Commentary: Capventis and other system integrators increasingly depend on open source to help them solve...