Security News

A new Android Trojan, Switcher, uses victims' devices to infect WiFi routers and funnel users of the network to malicious sites.

Several Netgear router models can be easily hijacked by remote, unauthenticated attackers, CERT/CC has warned on Friday. The vulnerability that allows this takeover can be exploited by simply...

Mobile app developers need to be aware of improper OAuth 2.0 implementations that have put one billion mobile apps at risk to takeover.




A serious vulnerability in the TCP implementation in Linux systems can be used identify hosts communicating over the protocol and attack that traffic.


We all know that scanning random QR codes is a risky proposition, but a newly detailed social engineering attack vector dubbed QRLJacking adds another risk layer to their use. Many web apps and...

BBC has the story. The confusion is that a scan of a passport is much easier to forge than an actual passport. This is a truly hard problem: how do you give people the ability to get back into...