The increased sophistication of voice-enabled smart speakers, combined with the rise of online meeting technologies such as Zoom has created an increasing and often overlooked IoT...
Many electronic reading (e-reading) systems that support the open EPUB format have significant security vulnerabilities, new research shows. The EPUB format relies primarily on XHTML and...
Trend Micro technology designed to protect home networks from attack was itself beset by multiple security flaws. The three vulnerabilities in Trend Micro’s Home Network Security Station, all discovered by...
Reviews are in on the administration’s long-awaited executive order following several major hacking campaigns. Sen. Ed Markey, D-Mass, and Rep. Ted Lieu, D-Calif., were pleased to...
Imagine a parent’s terror when the geolocation of their child’s smart watch suddenly switches from tennis practice to the middle of the ocean. This was precisely...
A signage of Microsoft is seen on March 13, 2020 in New York City. The IoT security team at the Microsoft Security Response Center said vulnerabilities...
The Cybersecurity and Infrastructure Security Agency (CISA) has published advisory ICSA-21-119-04 about vulnerabilities found in multiple real-time operating systems (RTOS) and supporting libraries. Those operating systems and libraries...
Microsoft security researchers have discovered over two dozen critical remote code execution (RCE) vulnerabilities in Internet of Things (IoT) devices and Operational Technology (OT) industrial systems. These...
Embedthis has patched a null byte injection vulnerability in GoAhead, the embedded web server deployed in hundreds of millions of devices. “A specially crafted URL with a %00 character embedded...
Through observation and analysis of open source information and behavior on multiple closed forums, Intel 471 found actors adopting the use of legitimate big data technology for...
Recent Comments