hardware
Hacking Team spyware survives on target systems with help of UEFI BIOS rootkit
How did Hacking Team make sure that its Remote Control System (RCS) spyware will remain on targets’ computers even if they reinstall their OS, format their hard drives …
65,000+ Land Rovers recalled due to software bug
Jaguar Land Rover has announced that owners of Range Rover and Range Rover Sport vehicles manufactured since 2013 will have to visit car dealers and get their car’s …
Flaw allows hijacking of professional surveillance AirLive cameras
Nahuel Riva, a research engineer from Core Security, discovered vulnerabilities in AirLive’s surveillance cameras designed for professional surveillance and security …
How you can anonymously use public Wi-Fi from miles afar
Benjamin Caudill, founder of Rhino Security Labs, is scheduled to demonstrate at the upcoming DefCon a new device that could help users achieve and maintain their online …
Multi-link network encryptor with 100 Gbps encrypted bandwidth
Gemalto released its new SafeNet Multi-Link High Speed Encryptor (HSE) solution that provides the equivalent of 10 by 10 Gbps high-speed encryptors in one unit. With a total …
Cisco finds, removes more default SSH keys on its software
Cisco has pushed out security updates to address two vulnerabilities in its Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Content …
Samsung disables Windows Update, undermines the security of your devices
Another example of how vendors sometimes choose to improve usability to the detriment of user security has been recently discovered by security researcher and Microsoft MVP …
Keyboard app bug puts millions of Samsung mobile users at risk, researcher claims
A vulnerability in the Swift keyboard, which comes pre-installed on Samsung mobile devices, can be exploited by remote attackers to secretly install malicious apps, access the …
Serious MitM flaw plugged in latest watchOS version
If you’ve recently bought an Apple Watch, or if you have had one for a while now, but you haven’t updated to the latest watchOS version, now is the time to do it …
Hackers can tamper with medical drug pumps, leading to fatal outcomes
Researcher Billy Rios has discovered serious vulnerabilities in several types of drug infusion pumps manufactured by US-based company Hospira – vulnerabilities that can …
IoT is full of gaping security holes, says Shodan creator
John Matherly’s Shodan, a search engine that finds Internet-connected devices, can be used for many things: gauging the impact of policies and network security efforts …
Drone detection: What works and what doesn’t
Another drone was discovered flying in restricted air space around the White House two weeks ago. The Secret Service found the pilot simply because they happened to see him. …
Featured news
Resources
Don't miss
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do