A joint research conducted by Level 3 Communications and Flashpoint allowed the identification of a million devices infected by the…
The cost of cybercrime could reach $6 trillion by 2021 (global annual cybercrime costs has been estimated $3 trillion in…
The Linux Trojan Linux.PNScan is back and it is actively targeting routers based on x86 Linux in an attempt to…
IoT devices are dramatically enlarging our surface of attack, hackers can exploit smart sockets to shut down Critical Systems. I…
Security Researchers demonstrated at the Def Con hacker conference how it is easy to open some Bluetooth-based smart locks. Last…
At the DEF CON conference, a group of three researchers from Red Balloon Security has demonstrated how to hack a…
The rise of the Internet of Things is being heralded by many as the beginning of a new Industrial Revolution.…
Experts discovered that Wireless keyboards from several vendors don’t use encryption when communicating with USB dongle being opened to KeySniffer…
According to the ICO Baby monitors are still open to hackers across the UK, the ICO issued a list of…
A research discovered two zero-day vulnerabilities residing in the official BMW web domain and ConnectedDrive portal that allow remote hack.…
This website uses cookies.