BlueBorne Attack Threatens IoT Devices
Researchers have developed a new attack against Bluetooth-enabled devices that takes advantage of the fact that these devices are always listening for connections and can
Researchers have developed a new attack against Bluetooth-enabled devices that takes advantage of the fact that these devices are always listening for connections and can
A vulnerability in nearly all of the current versions of Android can be used by attackers to execute an overlay attack to trick users into
Researchers have developed a method for sending human-inaudible ultrasonic voice commands to voice-enabled assistants such as Alexa, Siri, and Google Assistant that could be used
Police in Ukraine have arrested a 51-year-old man in connection with spreading the notorious Petya ransomware earlier this summer. In their statement, the Ukraine Cyberpolice
The ransomware that wreaked havoc on San Francisco’s Muni mass transit system last Thanksgiving has resurfaced and is infecting enterprises in several countries around the
A case making its way through the United States court system right now could have long-lasting effects on how much–if any–privacy travelers have when they
Google has released fixes for a long list of vulnerabilities in Android, including 10 critical flaws that could lead to remote code execution. All of
Siemens is warning customers that some of its CT and PET scanning machines have a pair of remotely exploitable vulnerabilities that attackers can use to
The Senate is considering a bill that would force some serious changes in the way that vendors handle the security of the IoT devices they