Hacking Smartwatches – the TomTom Runner
I intended originally for this series to contain only three posts, and in order to achieve that, this post is longer than anticipated. Here is a table of contents forRead More →
Data Security News | Infosec Blog | Information Security Tutorials
I intended originally for this series to contain only three posts, and in order to achieve that, this post is longer than anticipated. Here is a table of contents forRead More →
Researchers have found that thousands of Internet gateways, routers, modems and other embedded devices share cryptographic keys and certificates, exposing millions of connections to man-in-the-middle attacks that open the doorRead More →
One day, as you’re busy surfing on one of your favorite online stores, you stumble upon a pair of chic shades … they’re the very ones you’ve been looking for,Read More →
Security researcher warns hackers could steal personal information and turn the microphone of the doll into a surveillance device. Mattel’s latest Wi-Fi enabled Barbie doll can easily be hacked toRead More →
DRIDEX is steadily regaining its footing in the US just over a month after its takedown orchestrated by US and UK law enforcement agencies. Taking down servers is a significant stepRead More →
SSH logins, server-side HTTPS certs baked in firmware. It’s what we all assumed, but quietly hoped wasn’t quite this bad. Lazy makers of home routers and the Internet of ThingsRead More →
In short order, the newest version of Cryptowall has begun showing up in exploit kits. The SANS Internet Storm Center said on Tuesday that an attacker working off domains belongingRead More →
It was last year when a new method of attack on cellular networks was discovered. It requires neither costly radio scanners nor PC powerhouses and is available to virtually anyone.Read More →
WHEN SAMY KAMKAR lost his American Express card last August and received its replacement in the mail, something about the final digits on the new card set off an alertRead More →
We are seeing dozens of WordPress sites compromised recently with the same malicious code redirecting to the Angler exploit kit. The attack involves conditionally embedded large snippets of code at the bottomRead More →