Vulnerable updates in Cisco enterprise software
How even high-end solutions for business can have “childish” bugs in their update delivery systems.
14 articles
How even high-end solutions for business can have “childish” bugs in their update delivery systems.
Takeaway from DEF CON 30: vulnerability in Zoom for macOS.
At DEF CON 29, a researcher explained why agricultural machinery should be considered critical infrastructure and demonstrated vulnerabilities in the main manufacturers’ equipment.
Which is older, the phone or the fax? Is it true that no one faxes anymore? And can a fax machine be hacked? (Spoiler: yes)
Due to certification centers specifics, it is not rare for other people to hold a valid HTTPS certificate for your domain. What can go wrong?
How a seemingly harmless Android application can infect your smartphone using shared external storage.
When it comes to online accounts, voicemail is a major security hole. Here’s why.
The 50th edition of the Kaspersky Lab podcast looks into the latest in Google tracking, spam, and hacking ATMs and police body cameras.
Cyber-physical security researchers Marina Krotofil and Jason Larsen presented their research on hacking chemical plants at Black Hat and DEF CON – this was a very fascinating talk. It’s not
The predictability of human beings can barely be overestimated. This predictability can be easily exploited when it comes to things like passwords, secret words, PIN codes and more. Many of
If hacking were high fashion, this season’s hot trend would be car hacking. Shortly after researchers Charlie Miller and Chris Valasek revealed details on Jeep Cherokee’s breach, another team managed
Security researcher Chris Rock discovered, that it’s very easy to kill a human. We are talking in a legal sense not the one that carries moral and legal consequences. All
In the news this week: more APT campaigns, a look forward at the DEF CON and Black Hat Hacker conferences, and good and bad news for Facebook.
In the news: Microsoft’s No-IP takedown fiasco, Chinese APT groups curious about U.S. Iraq policy, Verizon says the government wants locations data, and Microsoft denies backdoor insinuations.