How does the CVE scoring system work?

How does the CVE scoring system work?

Have you ever wondered how vulnerabilities are scored? Here’s a simplified explanation for an overly complex system.   Metrics The first thing to understand is…

View More How does the CVE scoring system work?
A backdoor in Optergy tech could remotely shut down a smart building ‘with one click’

A backdoor in Optergy tech could remotely shut down a smart building ‘with one click’

Homeland Security has given the maximum severity score for a vulnerability in a popular smart building automation system. Optergy’s Proton allows building owners and managers…

View More A backdoor in Optergy tech could remotely shut down a smart building ‘with one click’
Over two million IoT devices vulnerable because of P2P component flaws

Over two million IoT devices vulnerable because of P2P component flaws

More than two million IoT devices, possibly more, are using a vulnerable P2P firmware component that allows hackers to locate and take over impacted systems.…

View More Over two million IoT devices vulnerable because of P2P component flaws