Please turn on your JavaScript for this page to function normally.
Car hacking via compromised car diagnostic tools

Car hacking is a topic that has received considerable attention from security researchers in the last year or so, and the general public and (hopefully) lawmakers are finally …

Too many vulnerable medical systems can be found online

How many critical medical systems can be found on the Internet, accessible to and hackable by remote attackers? According to security researchers Scott Erven and Mark Collao, …

Oysters tablet comes preinstalled with Trojanized Android firmware

“Keeping your mobile device free of malware requires intentional care, but sometimes even that is not enough. As Dr. Web researchers recently pointed out, a device you …

Silent Circle launches Blackphone 2, delivering business and personal privacy

Silent Circle has launched Blackphone 2 – its next-generation smartphone that delivers privacy and security. It provides full device encryption by default through harnessing …

CUJO: Plug-n-play protection for all devices

CUJO is a smart device that brings business level Internet security to guard all of your connected home devices. It’s simple to start with no installation necessary.You …

Killing computer infrastructures with a bang!

In an attempt to demonstrate how easy it would be for attackers to perform a high-voltage attack against a company’s computer infrastructure and take it down by damaging …

WD My Cloud NAS devices can be hijacked by attackers

Researchers with security consultancy VerSprite have unearthed several vulnerabilities in Western Digital’s My Cloud NAS product, which can be exploited by local and …

Malicious SYNful Cisco router implant found on more devices around the globe

“After FireEye researchers published on Tuesday their discovery of 14 Cisco routers in India, Mexico, Philippines and Ukraine that have been implanted with a modified, …

Malicious router implants open permanent entry points into target networks

“FireEye researchers have discovered 14 Cisco routers in India, Mexico, Philippines and Ukraine that have been implanted with malware that allows attackers to gain and …

Seagate wireless hard drives open wide to attack

Several Seagate wireless hard-drives have been found to be affected by multiple vulnerabilities, the CERT Coordination Center of the Software Engineering Institute at Carnegie …

0-days found in widely used Belkin router, fixes still unavailable

CERT/CC has issued a warning about the existence of several serious zero-day vulnerabilities affecting the popular Belkin N600 routers, and has offered advice on how users can …

CPU hardware performance counters for security

In this podcast recorded at Black Hat USA 2015, Nishad Herath, Principal Anti-Malware Technologist at Qualys, talks about CPU hardware performance counters, which allow us to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools