News

Vulnerabilities in Apple’s AirPlay protocol could have allowed attackers to execute code remotely without user interaction.
This particular vulnerability involves the use of a piece of software called gattacker which exploits vulnerabilities in Bluetooth Low Energy (BLE), a common protocol not only for IoT devices but ...
While viral videos of hacked crosswalks displaying faked messages amused many, the pranks highlight a sinister cybersecurity vulnerability lurking within the wireless technologies used by local ...
That's why I plead with you to stop exposing your Internet of Things (IoT) devices to the internet. I understand that not ...
As technology advances, so too do the methods employed by criminals seeking to exploit vulnerabilities within ATM networks.
A study at UCL highlights the vulnerabilities of Bluetooth Low Energy (BLE)-enabled medical devices ... How to defend systems It is clear from these examples that IoT security vulnerabilities go far ...
Researchers reveal a collection of bugs known as AirBorne that would allow any hacker on the same Wi-Fi network as a ...
Researchers at cybersecurity firm Oligo today outlined a series of AirPlay vulnerabilities that impact millions of Apple ...
agentless IoT security management offerings. The Nashville, Tenn.-based company automates some of the biggest IoT device vulnerability remediations and allows for threat and drift monitoring.