Please turn on your JavaScript for this page to function normally.
Intel
Researchers figured out how to disable the Intel ME controller on Intel chipsets

Researchers have discovered that Intel Management Engine (Intel ME) 11, a dedicated (and non-optional) microcontroller integrated into all Intel chipsets, can be disabled …

quantum
A step toward practical quantum encryption over free-space networks

Researchers have sent a quantum-secured message containing more than one bit of information per photon through the air above a city. The demonstration showed that it could one …

authentication
Researchers devise app to protect PINs and passwords

Every ATM or smartphone user can attest to the discomfort of having a stranger standing close enough to observe a financial transaction — and potentially note a PIN or account …

robot IOActive
Hacked robots can be a deadly insider threat

IOActive researchers have probed the security of a number of humanoid home and business robots as well industrial collaborative robots, and have found it seriously wanting. A …

DNA
Researchers pull off DNA-based malicious code injection attack

Researchers have demonstrated that it’s possible to create synthetic DNA strands containing malicious computer code that, if sequenced and analyzed, could compromise a …

IoT
US senators introduce bill to improve IoT security, protect researchers probing it

US Senators Mark Warner (D-VA), Cory Gardner (R-CO), Ron Wyden (D-WA) and Steve Daines (R-MT) introduced bipartisan legislation to improve the cybersecurity of …

chess
Weaponizing machine learning to improve cyber defenses

As defensive technologies based on machine learning become increasingly numerous, so will offensive ones – whether wielded by attackers or pentesters. The idea is the …

Hackers can turn Amazon Echo into a covert listening device

New research released by MWR InfoSecurity reveals how attackers can compromise the Amazon Echo and turn it into a covert listening device, without affecting its overall …

Tesla interior
Researchers remotely hack Tesla Model X

Security researchers from Tencent’s Keen Security Lab have done it again: they’ve found vulnerabilities in one of Tesla’s cars and demonstrated that they can …

phishing
Phishers’ techniques and behaviours, and what to do if you’ve been phished

Once a user has been phished, how long does it takes for the phishers to misuse the stolen credentials? To discover the answer to that question and many others, Imperva …

danger
Security vulnerabilities in radiation monitoring devices

IOActive researcher Ruben Santamarta has uncovered a number of cybersecurity vulnerabilities in widely deployed Radiation Monitoring Devices (RDMs), and has presented his …

Segway miniPRO
Critical security vulnerabilities enable full control of the Segway miniPRO electric scooter

New IOActive research exposes critical security vulnerabilities found in the Segway miniPRO electric scooter. If exploited, an attacker could bypass safety systems and …

Don't miss

Cybersecurity news