The Tor Project team has announced the release of Tor Browser 11.5, a major release that brings new features to help users fight censorship easier. The...
51% of industrial organizations believe that the number of cyber attacks on smart factories is likely to increase over the next 12 months, according to the Capgemini Research...
A chained, zero-day exploit could potentially expose all user data in the backend of the companion mobile application for a popular smart weight scale, security researchers have claimed....
A new industry group aims to coordinate efforts improve industrial control system security in an effort geared towards bolstering the resilience of critical infrastructure components. The US-based Operational Technology...
We are surrounded by billions of connected devices that contribute round-the-clock to practically every aspect of our lives – from transportation, to entertainment, to health and well-being. Since...
A Wyze Cam internet camera vulnerability allows unauthenticated, remote access to videos and images stored on local memory cards and has remained unfixed for almost three...
MikroTik routers are getting compromised to serve as communication proxies for Trickbot malware, to enable Trickbot-affected devices to communicate with their their C2 server in a...
From home appliances to your vehicle, something’s always watching you. Have you ever felt a creeping sensation that someone’s watching you? Then you turn around and...
More than 150 internet of things (IoT) devices used for commercial applications could be at risk of malicious takeover due to critical vulnerabilities in connected device...
As digital transformation materializes, businesses are becoming more reliant on devices that support valuable IoT services. As the reliance on these devices grows, so does the number of...
Recent Comments