hardware

Hacked robots can be a deadly insider threat
IOActive researchers have probed the security of a number of humanoid home and business robots as well industrial collaborative robots, and have found it seriously wanting. A …

Hacking smartphones with malicious replacement parts
Smartphone users can now add a new entry to the list of things they need to worry about: their phones being compromised via replacement parts. A group of researchers from …

Siemens CT scanners open to remote compromise via publicly available exploits
Siemens has finally provided patches for a number of Microsoft Windows SMBv1 vulnerabilities that affect some of the medical devices sold under the Siemens Healthineers brand. …

US Border Patrol isn’t allowed to search travelers’ data stored in the cloud
When searching travelers’ mobile phones at the border, US Customs and Border Protection (CBP) officers do not have the authority to rifle through data stored solely on …

IBM reboots iconic mainframe: Encrypt data all the time, at any scale
IBM today unveiled IBM Z, the next generation of a transaction system capable of running more than 12 billion encrypted transactions per day. The new system also introduces an …

Why Kodi boxes can pose a serious malware threat
When new streaming devices, such as the Amazon Firestick and Apple TV, were first introduced, many were intrigued by the ease by which they could watch “over the …

Privacy, security concerns grow for wearables
While Google Glass was not the success Google wanted it to be, there is no doubt that the wearable camera market is growing. People may have not been comfortable with the fact …

How the CIA hacked wireless home routers
For many years, the CIA has had the capability to compromise a wide range of commercial wireless routers, and to monitor, control and manipulate the traffic passing through …

iStorage introduces ultra-secure hard drives
iStorage launched of their new range of USB 3.1 HDDs and SSDs, consisting of the diskAshur, diskAshur SSD, diskAshur PRO, diskAshur PRO SSD and the diskAshur DT – all of …

Healthcare industry continues to struggle with software security
67% of medical device manufacturers and 56% of healthcare delivery organizations (HDOs) believe an attack on a medical device built or in use by their organizations is likely …

Samsung Galaxy S8 iris scanner can be fooled with a printed photo
After demonstrating how easily Apple’s Touch ID can be fooled with a user fingerprint photographed from a glass surface, Chaos Computer Club (CCC) hacker …

HP pushes out fix for keylogging audio driver in its laptops
Swiss security consultancy Modzero revealed on Thursday that a number of HP laptops contain an audio driver that logs users’ keystrokes and stores them in an unencrypted …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025