
Lovense vulnerabilities: insecure adult toys
This is a tale about how vulnerabilities in apps by intimate-toy maker Lovense exposed users’ identities and allowed for account takeovers — a problem the company ignored for years.
24 articles
This is a tale about how vulnerabilities in apps by intimate-toy maker Lovense exposed users’ identities and allowed for account takeovers — a problem the company ignored for years.
Hackers have long been engaging with the gaming world: from cracking games and creating cheats, to, more recently, attacking esports players live during an Apex Legends tournament. Regarding the latter, we break down what happened and how it could have been avoided.
Our experts found that a popular children’s toy robot contained vulnerabilities allowing malicious actors to make video calls to it, steal the parental account, and modify the firmware.
Attackers are hijacking hotel accounts on Booking.com, and stealing their clients’ banking data through its internal messaging system.
Fibaro Smart Home Centers can be hacked, and the consequences for smart home owners are big.
The “another friend request from you” hoax on Facebook is gaining traction. Don’t fall for it.
On this episode of podcast, Jeff and David discuss a vulnerability in baby monitors, password re-use in Britain’s GenZ, and more.
The real scale of the Yahoo breach (spoiler: 3 billion), Facebook’s own Face ID, UK Lottery DDoS, and more.
Drones are everywhere nowadays. Amazon delivers packages by drone. Filmmakers and media workers launch cameras into the air to take attractive wide shots. Some enthusiasts who don’t mind paying $500 or more
We have already told you about a number of hacker groups jackpotting money from ATMs. Now you can see it with your own eyes! Our experts shot four videos of
Has the shock and awe of Yahoo’s 500 million user credential hack died down yet? Everyone breathing a bit easier? Passwords changed, dead accounts deleted? For those of you chuckling
Researchers at Chinese security company Keen Lab claim that they have managed to remotely hack an unmodified Tesla Model S with the latest firmware installed. After one driver’s interaction with
Heading into the NFL Draft, Laremy Tunsil was considered by many to be the top player in the draft and would be one of the first players selected. Unfortunately for
Yesterday one of 2ch’s users attracted the attention of Russian media. This man streamed video from the hacked computers on YouTube. The anonymous user turned these sessions into a real
We know that our drumming on the importance of changing your passwords frequently can seem like overkill to many of our readers. However, to help prove the importance of this,
Experience shows that even Internet old-timers fail to protect themselves from targeted hacking. As our everyday life is becoming more and more connected to the Internet and other networks, online
The morning of November 24, 2014 is engrained into the collective memories of Sony Pictures Entertainment employees. On that day, an unknown cybergang hacked the company’s server, leaked a slew
With the Christmas season coming to a close, it seemed as if we were ready to wrap up the keyboard and get on with the whole jolliness and mirth of
Following recent terrorist attacks accusations against encrypted means of online communications once again became louder. However the proposed solutions could create even more problems. Governments around the world – from
A year ago our colleague David Jacoby, a researcher at GReAT, successfully attempted to hack his own home and discovered a lot of curious things. David’s experiment inspired many Kaspersky
In-flight security made quite a lot of headlines earlier this summer, but this time at unusual angle. Aviation has always been focused on safety and had remained the most secure