Taking control of a network by hacking a Philips Hue bulb
An information security firm reported the finding of a new vulnerability in Philips Hue devices that, if exploited, would allow a hacker to take control of a light bulb toRead More →
An information security firm reported the finding of a new vulnerability in Philips Hue devices that, if exploited, would allow a hacker to take control of a light bulb toRead More →
Although rarely exploited, vulnerability testing reports on WhatsApp have become prevalent in the cybersecurity community. The most recent of these reports refers to multiple failures that could alter some aspectsRead More →
Reports on the detection of new vulnerabilities are constantly appearing, affecting multiple commonly used and specialized technology developments and products. One of the most recent vulnerability testing reports refers toRead More →
Most people still ignore it, but information from peripheral devices (mainly scanners and printers) can be accessed over the Internet. It sounds very bad, and can get even worse, asRead More →
For most cryptocurrency enthusiasts and digital forensics specialists, storing virtual assets without an Internet connection (a practice usually known as cold storage) is the most secure way to hold theseRead More →
This has been a busy week for Cisco’s vulnerability testing team. A few hours ago, the company announced to its users that some of its Small Business Switch devices, widelyRead More →
A firm of network security specialists has reported the emergence of a security vulnerability in the Apache Solr platform, whose developers have been placed under continuous review due to theRead More →
A few months ago, an information security firm reported the hacking of the United Nations (UN) headquarters, an incident that jeopardized the integrity of thousands of personal records of itsRead More →
Although exploiting vulnerabilities in Apple developments is unusual, new security flaws are frequently reported, the scope of which, according to vulnerability testing specialists, varies depending on the affected product. ThisRead More →
When a new security flaw is reported in a software development, it starts a race between vulnerability testing experts in charge of correcting it and cybercriminals who want to exploitRead More →