Security News
Spurred by several past instances of attackers abusing device drivers to install a kernel rootkit or malicious firmware implants, Eclypsium researchers have decided to probe the security of a wide...
Researchers at cybersecurity firm Check Point have demonstrated that malicious actors could hack a DSLR camera and infect it with a piece of ransomware. read more
It formalizes the reality: "pre-jailbroken" iPhones were already on the black market.
Researcher show how they hacked Google Home smart speakers using the Megellan vulnerability.
Repurposing Mac malware is not a difficult task for someone with reverse-engineering skills, and it’s a far simpler approach compared to writing malware from scratch, a researcher has...
Three years ago at the Black Hat conference, Apple announced its first bug bounty program, which was invite-only and limited to iOS. At this year’s edition of the con, Ivan Krstić, Apple’s head of...
Researchers from security firm IOActive have discovered a series of vulnerabilities and attacks that they believe could be possible on Boeing's 787 Dreamliner. read more
Researchers were able to bypass Apple's FaceID using a pair of glasses with tape on the lenses.
You might not think your phone is as exposed as an internet server - but it's handling plenty of untrusted data from unknown sources!
NCC Group researchers have uncovered significant vulnerabilities in six commonly used enterprise printers, highlighting the vast attack surface that can be presented by internet-connected...