Router manufacturers such as Netgear and ZyXEL have failed to address seven security flaws reported by security researchers in the last three or more months.
Netgear has expanded the list of routers vulnerable to a simple yet dangerous exploit that came to light last week, and which is trivial to weaponize and allows attackers to take control over affected devices.
The United States Computer Emergency Readiness Team (US-CERT), an organization within the Department of Homeland Security (DHS), has published a security alert yesterday, warning owners of Netgear R6400 and R7000 models against using their routers for the time being, because of a severe security flaw.
The security protocol that governs how virtual machines share data on a host system powered by AMD Zen processors has been found to be insecure, at least in theory, by Felicitas Hetzelt and Robert Buhren, two scientists at the Security in Telecommunications Department at the Technical University of Berlin, Germany.
Around six months ago, an Internet service provider (ISP) doing business in the Middle East was forced to ask a security researcher for help in order to regain access to over 15,000 routers it was about to lose control of.
Hundreds of thousands of IP cameras from several vendors are affected by two zero-day vulnerabilities that allow an attacker to hijack the device, use it as a pivot point for other attacks, or spy on the camera's owner.
Sony has released firmware updates that remove a remotely exploitable backdoor account from 80 models of IP and security cameras.
A judge in New York has sentenced Dariusz J. Prugar, 32, of Syracuse, New York, to two years in prison for hacking his former employee, Pa Online, an internet service provider (ISP) formerly located in Enola, Pennsylvania.
For two days now, over 900,000 routers belonging to Deutsche Telekom users in Germany have been knocked offline following a supposed cyber-attack.
A new battery technology developed in the US will take seconds to charge, last over a week, and survive 30,000 recharge cycles, 20 times more than regular Lithium-ion batteries deployed today.
Malware can alter local motherboard or sound card settings and turn your headphones or speakers into covert microphones, allowing attackers to record sound from computers that you previously thought to be safe.
Office Depot employees have been selling unnecessary tech repair services after telling customers that their laptops and computers were infected with malware, reporters from Seattle TV station KIRO 7 said this week after being tipped off by a former employee.
Hardware hacker Samy Kamkar has released a new tool called PoisonTap that is capable of a plethora of malicious actions, all of which work even against password-protected computers on which an attacker can't access the desktop.
The way users move fingers across a phone's touchscreen alters the WiFi signals transmitted by a mobile phone, causing interruptions that an attacker can intercept, analyze, and reverse engineer to accurately guess what the user has typed on his phone or in password input fields.
Researchers are working on a new CPU chip design that will extend the fight against malware at the hardware level in an attempt to bolster computers, mobiles, and other devices against the rising wave of security threats.
Researchers from Vanderbilt University have discovered that they can use a combination of common metals found in scrapyards and every household to create fully-working batteries that provide decent voltage and last through thousands of recharging cycles.
123inkt, a Dutch reseller of printer ink cartridges, has accused HP of intentionally sabotaging non-HP ink cartridges via a failure date, pre-programmed in the firmware of some HP laser ink printers.
A researcher from the University of Cambridge has proven the FBI wrong after Bureau officials said the technique known as NAND mirroring wouldn't work in hacking the San Bernardino's iPhone.
Research published last week by the Cyber-Security Research Center at the Ben-Gurion University of the Negev in Israel reveals that it only takes about 6,000 smartphones infected with malware to launch a DDoS attack capable of shutting down 911 emergency services in a US state.
A commercial device known as USB Kill 2.0 allegedly has the ability to fry a number of electrical devices by sending an electrical charge to a public-facing USB port. Using a standard USB port, USB Killer will charge itself with electricity and then discharge to fry the device it is plugged into.