Google OnHub review—Google’s smart home Trojan horse is a $200 leap of faith
Google’s OnHub is a bit of a mystery. Google shipped us this box—well, this cylinder—but it won’t really talk about what’s in it or why it exists. Today, it’s aRead More →
Google’s OnHub is a bit of a mystery. Google shipped us this box—well, this cylinder—but it won’t really talk about what’s in it or why it exists. Today, it’s aRead More →
Ilya Karpov of Russian security outfit Positive Technologies has reported nine vulnerabilities in Siemens industrial control system kit used in critical operations from petrochemical labs and power plants up toRead More →
British police have today announced the arrest of six people in connection with distributed denial-of-service (DDoS) attacks that attempted to bring down websites belonging to – amongst others – aRead More →
The former FireEye intern that was arrested during the Darkode forum FBI crackdown has pleaded guilty and is now facing up to 10 years in prison and a fine ofRead More →
It’s the third bug of the year for Facebook bounty hunter Laxman Muthiyah. At the start of 2015 he noticed that if you could view a photo album on Facebook,Read More →
Six teenagers, including an 18-year-old from West Yorkshire, have been arrested on suspicion of launching cyber attacks using a service created by a notorious hacking group which previously targeted XboxRead More →
A massive uptick in malvertising has taken place over the last few years and is becoming so popular that it may become the top technique used for drive by attacks,Read More →
Reflective technique would let attacker amplify traffic and flood targets. BitTorrent has fixed a flaw in its technology that quietly turns file-sharing networks into weapons capable of blasting websites andRead More →
Hackers, months ago, revived macros as an attack vector to primarily hide banking malware spread by spam campaigns. Not be left out, some targeted attacks kicked off by convincing phishingRead More →
Major vulnerabilities have been detected in Dolphin and Mercury Android browsers that could have provided cybercriminals with the opportunity to launch zero-day attacks. This is considered to be a notableRead More →