Attack uses ultrasonic sound waves to disrupt HHD read/write operations, which could lead to a system crash.
Browsing Author: Tom Spring
Telcom firm leaves port open on customer routers after maintenance update exposing hundreds of customers to possible attack.
Millions of IoT devices based on the Z-Wave wireless protocol are vulnerable to a downgrade attack during pairing sessions.
Researchers warn of malware infecting 500,000 popular routers in a campaign mostly targeting the Ukraine, but also 54 other countries.
A bug in Comcast’s activation website for its Xfinity routers leaked sensitive customer data.
A botnet called Brain Food is pushing diet pills via infected WordPress and Joomla websites.
Researchers created a proof-of-concept attack that allows remote attackers to access protected APIs to extract credentials.
The company urges customers to patch three vulnerabilities that received the highest severity rating of 10.
Cryptominer WinstarNssmMiner is an aggressive malware strain that has launched 500,000 attacks in the past three days earning criminals $28,000.
Universal Plug and Play networking protocols can be exploited to bypass DDoS mitigations.