Originally, O.MG Cable was introduced in 2019. In 2019, at DEFCON, an IT security researcher going by the online handle of MG...
A new threat has caught the attention of the cybersecurity community in Los Angeles, California. According to the district attorney office, some...
Sony has unveiled a new USB-C saying it is the “world’s fastest smart multifunction USB hub.” Dubbed the MRW-S3, this SD card...
Everyone would have well known with capturing network packets using analyzer tools. But very few have known with capturing with USB packets....
Windows 10 bug: If you have a device connected via cable to the USB Type-C input, you may have to wait another...
Every Windows 10 update comes with its own share of weird issues that are often hard to explain and funny at the...
Vishwanath Akuthota, a former student at The College of Saint Rose in Albany, New York, has pled guilty to causing heavy damage to...
There was a time when the USB 2.0 port on our PCs was fast enough to transfer countless songs and video clips....
Bid goodbye to slow data transfer speed as the ultra-fast USB 3.2 is here and will be available later this year. The...
Today, the world has become heavily reliant on computers owing to the various advantages they offer. It has thus become imperative that...
USB cables utilized for injecting malware seems an emerging threat that people would have to deal with. Last year, a researcher showcased the capability...
USB-IF announced USB Type-C Authentication Program to confirm the authencity of the USB device USB device, USB cable or USB charger. The...
Today, the USB Implementers Forum officially launched the USB Type-C Authentication Program to set a standard for type-C USB device for improved security. Presently,...
Due to the carelessness of an employee, who apparently was a porn fan, the network of the satellite imaging facility, the U.S....
Schneider Electric has released a warning and advisory notice according to which the USB drives shipped with some of the company’s products...
Data protection, whether related to personal customer or patient information, is critical across virtually all industries. A survey made by information security trainingresearchers...
The general perception of the public is that Linux and macOS operating systems are far more secure as compared to Windows. While...
Short Bytes: The USB ports on your laptop or desktop computer can be used to steal your sensitive information. According to a...
Hackers can exploit electronic cigarettes and any other electronic device to deliver a malware in a poorly protected network. In November 2014,...
It seems that Mazda car owners have discovered a hack that allows them to tweak the Mazda’s MZD Connect infotainment system by...
Short Bytes: USB Canary is an open source tool that monitors for any suspicious activity on a computer. Written in Python language,...