Reverse engineering a Smarter Coffee machine for fun and a security lesson

9 years ago

Simone Margaritelli has done a reverse engineering of the Smarter Coffee IoT Machine Protocol to control the machine from his…

Breaking the Microsoft JEA technology to hack a system

9 years ago

The security researcher Matt Weeks discovered a way to abuse the Microsoft Just Enough Administration (JEA) technology to escalate user…

The fall of the Encryptor RaaS also thanks to Shodan

9 years ago

Law enforcement and security experts have dismantled the Encryptor RaaS architecture by localizing one of its servers with Shodan. Shodan…

Also Spotify in the list of services victim of a malvertising campaign

9 years ago

The users of the free version of the popular Spotify online music service have been served malicious advertisements. Spotify users…

Security Affairs newsletter Round 81 – News of the week

9 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

Authorities warn of cyber threat related to malicious ‘Hurricane Matthew’ emails

9 years ago

As the Hurricane Matthew batters the South Carolina coast, authorities are warning of a series of cyber attacks against residents.…

Cisco warns of critical vulnerabilities in CISCO Nexus switches

9 years ago

Cisco has rolled out several critical software patches for the CISCO Nexus 7000-series switches and the related NX-OS software. According…

US accuses Russia of attempting to disrupt the US Presidential election

9 years ago

Washington demands a strong response to the alleged Russian attempts to manipulate the Presidential Election 2016 with cyber attacks. US…

OilRig campaign, Iran-Linked Hackers Target US Government & Energy Grid

9 years ago

OilRig campaign - An Iran-linked hacker group which previously targeted organizations in Saudi Arabia has now set its sights on…

More than 500,000 IoT devices potentially recruitable in the Mirai Botnet

9 years ago

Security experts have discovered more than 500,000 vulnerable Internet of Things (IoT) devices that could be potentially recruited in the…

This website uses cookies.