Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices

Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices

Security researchers have disclosed details today about 11 vulnerabilities known collectively as “Urgent11” that impact a wide range of devices, from routers to medical systems,…

View More Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices
Mirai Groups Target Business IoT Devices

Mirai Groups Target Business IoT Devices

More than 30% of Mirai attacks and an increasing number of variants of the malware are going after enterprise IoT devices, raising the stakes for…

View More Mirai Groups Target Business IoT Devices
Harnessing DIY IoT to Manage Type 1 Diabetes

Harnessing DIY IoT to Manage Type 1 Diabetes

Early last year, my family was thrust quite suddenly into the world of type 1 diabetes (T1D). We spent almost a week in the hospital…

View More Harnessing DIY IoT to Manage Type 1 Diabetes
NSA: Turn off these smartphone features if you want your location to stay secret

NSA: Turn off these smartphone features if you want your location to stay secret

The U.S. National Security Agency has urged the Department of Defense and other national-security personnel to deactivate Bluetooth, Wi-Fi and GPS on their phones if…

View More NSA: Turn off these smartphone features if you want your location to stay secret
Garmin services and production go down after ransomware attack

Garmin services and production go down after ransomware attack

Smartwatch and wearables maker Garmin has shut down several of its services today to deal with a ransomware attack that has encrypted its internal network…

View More Garmin services and production go down after ransomware attack
Hackers Can Now Trick USB Chargers To Destroy Your Devices—This Is How It Works

Hackers Can Now Trick USB Chargers To Destroy Your Devices—This Is How It Works

Not all cyberattacks focus on data theft. Sometimes the intent is “to achieve the destruction of the physical world through digital means,” Chinese tech giant…

View More Hackers Can Now Trick USB Chargers To Destroy Your Devices—This Is How It Works
Bug in Anesthesia Respirators Allows Cyber-Tampering

Bug in Anesthesia Respirators Allows Cyber-Tampering

A vulnerability in GE Healthcare’s Aestiva and Aespire anesthesia devices would allow an unauthenticated cybercriminal on the same network as the device to modify gas…

View More Bug in Anesthesia Respirators Allows Cyber-Tampering
Toyota's Car-Hacking Tool Now Available

Toyota’s Car-Hacking Tool Now Available

Toyota officially has begun offering a commercial version of its new Portable Automotive Security Testbed (PASTA) open-source testing platform for researchers and nascent car-hacking experts.…

View More Toyota’s Car-Hacking Tool Now Available
Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries

Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries

Millions of devices, from consumer products like printers and IP cameras to specialized devices used across organizations such as video conferencing systems and industrial control…

View More Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries
Smart Lock Turns Out to be Not So Smart, or Secure

Smart Lock Turns Out to be Not So Smart, or Secure

Researchers are warning a keyless smart door lock made by U-tec, called Ultraloq, could allow attackers to track down where the device is being used…

View More Smart Lock Turns Out to be Not So Smart, or Secure