Mobile security experts from Skycure have found two methods for bypassing the security containers put around “Android for Work,” allowing attackers to...
German watchdog classifies My Friend Cayla doll as ‘illegal espionage apparatus’ and says shops and owners could face fines An official watchdog...
The concept of a connected car, or a car equipped with Internet access, has been gaining popularity for the last several years....
Plus a new, stealthy “anonymous” stick, because that’s what the world really needed. Remember the USB Killer stick that indiscriminately and immediately...
Researchers from Boston University, North Carolina State University, and George Mason University have created a new protocol called TumbleBit that they say...
As I said on my previous article, being a penetration tester makes us feel like a group of traveler. Today, I would...
At Context we’re always on the lookout for interesting devices to play with. Sat in a meeting room one day, we noticed...
The organization is requesting permission to limit disclosures to only the most severe bugs. The Xen Project has requested feedback from the...
There’s a disturbing possibility that the Mexican government, the soda industry, or some combination of both used spyware to harass health advocates...
Dutch malware experts have found a new malware strain that targets online shops running on the Magento platform, which can self-heal using...
Amster-damn, that’s a hell of a vulnerability to make browser bug exploitation easier. Researchers in Europe have developed a way to exploit...
The security researchers at the Georgia Institute of Technology have simulated a ransomware-based attack on PLCs in a water treatment plant. The...
Chinese router maker TP-Link is wrestling with the disclosure of a handful of vulnerabilities in its C2 and C20i routers. The most...
It starts with a phishing attack over SMS, continues with a bad app and ends with your stolen bank account. Android-targeting banking...
Independent security researcher wants to make creating Tor hidden service versions of websites that much easier. More mainstream services and websites are...
Home Ministry’s website mha.nic.in hacked; Hackers exploited Drupal vulnerability Unknown hackers today used a Drupal exploit to hack mha.nic.in, which is Indian...
An ultranationalist developer from Serbia is behind a series of malware strains, including a new ransomware family named SerbRansom, discovered yesterday by...
The Internet Systems Consortium patched the BIND domain name system this week, addressing a remotely exploitable vulnerability it considers high severity and...
Microsoft says it will fully power up its Azure SQL Database Threat Detection service this spring. This technology, which has been in...
For many of us hacking of printers seems to be next to impossible thing. But, a hacker has hacked more than 150,000...
Recently I was given the task of performing command execution on a compromised MSSQL server with the following restrictions: No use of...