Security researchers and penetration testers have used the open source Metasploit Framework to probe for vulnerabilities, run exploits, and simulate real-world attacks...
LG has updated its software after security researchers spotted a flaw that allowed them to gain control of devices like refrigerators, ovens,...
In 2016, Mirai botnet shook the cybersecurity world with massive DDoS attacks that took down popular websites, online services, and hosting providers....
The Internet of Things or IoT refers to the vast network of connected devices or “things” connected to the Internet which can...
Just a year after Mirai—biggest IoT-based malware that caused vast Internet outages by launching massive DDoS attacks—completed its first anniversary, security researchers...
We often hear about smart home speakers eavesdropping on all the conversations inside the home because these are already equipped with the...
Smart Sex Toys Can Be Switched On/Off and Exploited Remotely – Thanks To A Vulnerability. Pen Test Partners (PTP) is a security...
If you own Hikvision security cameras you would have noticed the sudden change in the live feed display where the normal footages...
Another day, another set of critical vulnerabilities in wireless medical devices – This time; high severity flaws identified in Smiths Medical Syringe...
According to the latest research from a collaborative team of researchers from Linklayer Labs, Politecnico di Milano and Trend Micro’s Forward-looking Threat...
Our world is full of good and bad people and same applies for hackers. Where there are hackers eager to use their...
We know that this is the age of smart gadgets and self-operational machines. However, the cons associated with such devices easily surpass...
Willem Westerhof, a cybersecurity researcher at Dutch security firm ITsec, has identified a serious vulnerability in an essential component of solar panels,...
Taking over an IoT (Internet of Things) device is nothing new for hackers, but since users have become increasingly dependent on smart devices,...
The hackers from Keen Security Labs, a part of Chinese Internet giant Tencent Holdings discovered some critical security flaws in Tesla Model X “holiday show” easter...
A $1500 smart gun developed with the main objective of reducing gun crime has an inherent security flaw, which is so huge...
It is understandable to receive Internet of Things (IoT) related warnings like vulnerable public WiFi or charging spots that can be hacked...
It is a fact that the soaring number of internet-connected devices has made it easier for cyber-criminals to fulfill their malicious objectives...
Without a doubt, hoverboards are the latest fad. Hoverboards are indeed very useful as these aren’t only easy to use but make...
Attackers using the SambaCry vulnerability to target older versions of Samba(3.5.0) to upload and execute the malicious payload. SambaCry Vulnerability(CVE-2017-7494) have the...
A New Vulnerability called “Devil’s Ivy” Discovered that infected Tens of Millions of IoT Devices which leads to Remotely Execute the code...