hardware
Hacker hijacks baby monitor camera, terrorizes family
A Houston, Texas couple got a great shock this weekend when they heard a male voice coming from a room where their two year old was sleeping. They heard the man shouting to …
Hacking a smart lightbulb system
The phenomenon of the Internet of Things (IoT) is positively influencing our lives by augmenting our spaces with intelligent and connected devices. Examples of these devices …
Fortinet expands secure application delivery product portfolio
Fortinet announced new additions to its secure application delivery product portfolio that are a result of the company’s acquisitions of Coyote Point Systems and XDN. …
Self-encrypted 2.5″ SATA SSD from Microsemi
Microsemi announced a secure, half-terabyte SSD for mobile video surveillance operations, SANs and other high capacity storage applications requiring superior real-time data …
HackShield bags prevent physical and digital intrusion
Das Keyboard launched highly secure, radio frequency blocking bags. Known as HackShield bags, the company’s one-of-a-kind backpack and messenger bags empower …
nPulse updates its flow and packet capture appliance
nPulse released a new version of its Capture Probe eXtreme (CPX) flow and packet capture appliance, which provides a packet indexing solution at 30 million packets per second. …
Hijacking ships and planes with cheap GPS spoofers and laptops
After demonstrating a successful GPS spoofing attack against a drone (UAV – unmanned aerial vehicle) last June, Cockrell School of Engineering Assistant Professor Todd …
The scary implications of Google Glass
Google Glass, for all its promise, has some scary implications. Here is my list of potential challenges we face with Glass: User experience Social awkwardness Privacy (or lack …
Video: Hackers for hire
Hackers are the 21st century warriors who worry many. As everything we use becomes increasingly connected, so their opportunities to hack, divert or destroy increase. NATO …
Solera Networks enhances advanced threat protection
Solera Networks introduced the Blue Coat ThreatBLADES, making it possible for enterprises to protect against and resolve advanced targeted attacks. ThreatBLADES unify threat …
SIM encryption flaw opens 500M users to attack
A flaw in the encryption technology used by some SIM cards can allow attackers to make the target phone download malicious apps and even effectively clone a user’s card …
New ReadyNAS rackmount devices from NETGEAR
NETGEAR announced ReadyNAS 3220 and ReadyNAS 4220, the latest NAS products to run on the ReadyNAS OS, introduced in March 2013. Available in 2U rackmount form with 12-bay …
Featured news
Resources
Don't miss
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains
- Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)
- October 2025 Patch Tuesday forecast: The end of a decade with Microsoft
- From theory to training: Lessons in making NICE usable