Please turn on your JavaScript for this page to function normally.
Criminals hacked chip-and-PIN system by perfecting researchers’ PoC attack

When in 2010 a team of computer scientists at Cambridge University demonstrated how the chip and PIN system used on many modern payment cards can be bypassed by making the POS …

Secret code in color printers enables government tracking

A research team led by the EFF recently broke the code behind tiny tracking dots that some color laser printers secretly hide in every document.The U.S. Secret Service …

Point-and-shoot weapon stops drones without destroying them

Unmanned aerial vehicles – so-called drones – can be helpful, malicious, or simply disruptive, depending on the intentions of those who use them.But while regular …

Attackers can use Siri, Google Now to secretly take over smartphones

A team of researchers from the French Network and Information Security Agency (ANSSI) has devised a way to covertly exploit the Siri and Google Now voice activated personal …

USB Killer 2.0: A harmless-looking USB stick that destroys computers

Plugging in random USB sticks in your computer has never been more dangerous, as a researcher who goes by the name Dark Purple has demonstrated his new device: USB Killer …

Global Internet experts reveal plan for more secure, reliable Wi-Fi routers

In a letter submitted to the Federal Communications Commission (FCC), Dave Täht, co-founder of the Bufferbloat Project, and Dr. Vinton Cerf, co-inventor of the Internet, along …

Authentication bypass flaw in Netgear SOHO routers exploited in the wild

A critical security vulnerability affecting nine Netgear router models is being exploited in the wild. The flaw that the attackers took advantage of allowed them to access the …

Attackers compromise Cisco Web VPNs to steal login credentials, backdoor target networks

Another Cisco product is being targeted by attackers looking for a permanent way into the computer networks and systems of various organizations, Volexity researchers …

New Toshiba CMOS image sensor improves recognition and authentication

In recent years, mobile devices have adopted user authentication systems to protect access and information security. Password entry remains the most common, but finger print …

Pen-testing drone searches for unsecured devices

You’re sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer …

Huawei 3G routers rife with flaws

South Korean security researcher Pierre Kim has revealed today that fifteen Huawei 3G routers have a slew of serious vulnerabilities – RCE, XSS, CSRF, DoS, …

Wealth of personal data found on used electronics purchased online

Varying amounts and types of residual data have been found on used mobile devices, hard disk drives and solid state drives purchased online from Amazon, eBay and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools