News

Vulnerabilities in Apple’s AirPlay protocol could have allowed attackers to execute code remotely without user interaction.
The CVE presentation notes that the Bluetooth specification does not cover either FuS or FoS. In total two new architectural vulnerabilities were discovered, both of which attack the security key.
While viral videos of hacked crosswalks displaying faked messages amused many, the pranks highlight a sinister cybersecurity vulnerability lurking within the wireless technologies used by local ...
That's why I plead with you to stop exposing your Internet of Things (IoT) devices to the internet. I understand that not ...
Researchers reveal a collection of bugs known as AirBorne that would allow any hacker on the same Wi-Fi network as a ...
A study at UCL highlights the vulnerabilities of Bluetooth Low Energy (BLE)-enabled medical devices ... How to defend systems It is clear from these examples that IoT security vulnerabilities go far ...
Researchers at cybersecurity firm Oligo today outlined a series of AirPlay vulnerabilities that impact millions of Apple ...
As technology advances, so too do the methods employed by criminals seeking to exploit vulnerabilities within ATM networks.