The company behind Aztarna is Alias Robotics, a cyber-security startup. Manufacturers and users of IoT robots should breathe a sigh of relief that...
A security researcher has discovered multiple one-click client-side vulnerabilities in the some of the world’s most popular and widely-used web hosting companies...
Weak security practices have rendered IoT devices vulnerable to hacking and all sorts of cyber-attacks. According to the research from a Buckinghamshire-based...
An attacker could find any device, infect it and make it part of a botnet A critical vulnerability present in a Huawei...
Cybersecurity researchers have discovered a critical vulnerability in widely used SQLite database software that exposes billions of deployments to hackers. Dubbed as...
New research reveals that Universal Plug and Play (UPnP) implemented 277,000 Connected Devices are vulnerable to malicious proxy system UPnProxy , a dubbed EternalSilence NSA hacking...
When news broke about Cambridge Analytica, the Internet went into a frenzy: “How could Facebook do this!” “Facebook should be made accountable!” Besides...
Using a smart combination of different tools, Kamerka can take an address, a cue point or coordinates and show exposed cameras connected...
The flaw allows remote code execution to hackers A security error in Systemd can be exploited over the network for, at best,...
A security researcher named Sebastián Castro has uncovered a way of gaining admin rights and boot persistence on Windows PCs that is...
Several Critical Vulnerabilities Identified in Major Weapon Systems Being Developed by US DoD. The advanced weapon systems developed by the US Department...
Five out of six brand routers such as Linksys, NETGEAR, and D-Link, contain known open-source vulnerabilities Experts in digital forensics report an exorbitant figure regarding to the use of domestic and organizational tasks routers,...
Right after the smartphone and tablet revolution that disrupted the laptop market considerably, the next big thing is the proliferation of IoT...
Windows-based Outlook Express for a long time had been the center of controversy for Microsoft for implementing an insecure email client from...
A new zero-day exploit for Windows VBScript Engine discovered that belongs to North Korean cyber criminals gang called Darkhotel which is the same...
It is recommended to install the released security patches as soon as possible Drupal, the popular open source content management system, has...
According to a recent survey report, many big IT decision-makers see Enterprise Communication and Collaboration (EC&C ) apps like Slack, Dropbox, etc...
Researchers specializing in enterprise data protection services have analyzed more than a dozen mobile apps provided by shared car companies and have...
The aviation industry is growing, thanks to millions of passengers traveling around the world. According to Statista, in 2017, 36.8 million flights were operated...
2018 begins with the rise of the Internet of Things (” IoT “) which is based on the existence of an interconnection...
Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to...