The NetCAT is out of the bag: Intel chipset exploited to sniff SSH passwords as they're typed over the network

The NetCAT is out of the bag: Intel chipset exploited to sniff SSH passwords as they’re typed over the network

It is possible to discern someone’s SSH password as they type it into a terminal over the network by exploiting an interesting side-channel vulnerability in…

View More The NetCAT is out of the bag: Intel chipset exploited to sniff SSH passwords as they’re typed over the network
A new IOT botnet is infecting Android-based set-top boxes

A new IOT botnet is infecting Android-based set-top boxes

A new IoT botnet named Ares is infecting Android-based devices that have left a debug port exposed on the Internet. Among this botnet’s most common…

View More A new IOT botnet is infecting Android-based set-top boxes
Microsoft Patches 18 Year Old Windows Zero Day

Microsoft Patches 18 Year Old Windows Zero Day

Software buried in Windows since the days of WinXP can be abused to take complete control of a PC with the help of good ol’…

View More Microsoft Patches 18 Year Old Windows Zero Day
More critical Remote Desktop flaws expose Windows systems to hacking

More critical Remote Desktop flaws expose Windows systems to hacking

Microsoft has identified and patched several vulnerabilities in the Windows Remote Desktop Services (RDS) component — formerly known as Terminal Services — which is widely…

View More More critical Remote Desktop flaws expose Windows systems to hacking

Even DSLR cameras are vulnerable to ransomware

Cameras are among the few devices that don’t connect to the internet, so you’d think they’d be immune to hackers. However, researchers have discovered that some DSLRs…

View More Even DSLR cameras are vulnerable to ransomware
New Vulnerability Risk Model Promises More-Efficient Security

New Vulnerability Risk Model Promises More-Efficient Security

Vulnerabilities happen. There’s nothing new or mysterious about that. Neither is there mystery around the fact that something must be done to address vulnerabilities. But…

View More New Vulnerability Risk Model Promises More-Efficient Security
New Class Of SQLite Exploits Open Door To iPhone Hack

New Class Of SQLite Exploits Open Door To iPhone Hack

Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context of a browser for the first time. The new…

View More New Class Of SQLite Exploits Open Door To iPhone Hack
Cisco Pays $8.6M in First False Claims Suit for Vulnerabilities in Security Product

Cisco Pays $8.6M in First False Claims Suit for Vulnerabilities in Security Product

A security consultant reported vulnerabilities in Cisco’s Video Surveillance Manager in 2009 – but the company ignored the issues and fired the consultant. Cisco Systems…

View More Cisco Pays $8.6M in First False Claims Suit for Vulnerabilities in Security Product
New Dragonblood vulnerabilities found in WiFi WPA3 standard

New Dragonblood vulnerabilities found in WiFi WPA3 standard

Earlier this year in April, two security researchers disclosed details about five vulnerabilities (collectively known as Dragonblood) in the WiFi Alliance’s recently launched WPA3 WiFi…

View More New Dragonblood vulnerabilities found in WiFi WPA3 standard
Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices

Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices

Security researchers have disclosed details today about 11 vulnerabilities known collectively as “Urgent11” that impact a wide range of devices, from routers to medical systems,…

View More Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices