Vulnerable updates in Cisco enterprise software
How even high-end solutions for business can have “childish” bugs in their update delivery systems.
14 articles
How even high-end solutions for business can have “childish” bugs in their update delivery systems.
Takeaway from DEF CON 30: vulnerability in Zoom for macOS.
At DEF CON 29, a researcher explained why agricultural machinery should be considered critical infrastructure and demonstrated vulnerabilities in the main manufacturers’ equipment.
Which is older, the phone or the fax? Is it true that no one faxes anymore? And can a fax machine be hacked? (Spoiler: yes)
Due to certification centers specifics, it is not rare for other people to hold a valid HTTPS certificate for your domain. What can go wrong?
How a seemingly harmless Android application can infect your smartphone using shared external storage.
When it comes to online accounts, voicemail is a major security hole. Here’s why.
The 50th edition of the Kaspersky Lab podcast looks into the latest in Google tracking, spam, and hacking ATMs and police body cameras.
Since there’s nothing unhackable in this world, why should chemical plants should be the exception?
Predictability of human beings can barely be overestimated when it comes to passwords. But what about lock screen patterns, are we predictable as well when we’re creating them?
Researchers compete at finding security holes in infotainment systems of connected cars and breaking in. The new case proves that Tesla does care a lot about security at wheel.
Security researcher Chris Rock discovered, that it’s very easy to kill a human. All you need is just a computer with Internet access, some knowledge and common sense.
In the news this week: more APT campaigns, a look forward at the DEF CON and Black Hat Hacker conferences, and good and bad news for Facebook.
In the news: Microsoft’s No-IP takedown fiasco, Chinese APT groups curious about U.S. Iraq policy, Verizon says the government wants locations data, and Microsoft denies backdoor insinuations.