Researchers found an array of vulnerabilities in the Logitech Harmony Hub, shedding light on IoT security.
An attacker can gain man-in-the-middle access to inject a rogue executable file onto the phone.
The bill would have allowed companies in the state to perform offensive cyberactions in the face of an attack.
In total, Microsoft’s May Patch Tuesday roundup included 68 security patches, with 21 listed as critical, 45 rated important and two listed low in severity.
The flaws would leave the enterprise devices helpless to a range of remote threats, including the charms of the Reaper IoT botnet.
Adobe fixed critical vulnerabilities in Adobe Flash Player and Creative Cloud as part of its regularly scheduled May Security Bulletin, on Tuesday.
As companies continue to install the vulnerable version of Apache Struts behind the breach, Equifax has filed a clarification statement.
Tech-support scams took off during the year, while whaling/business email compromise was the main threat, accounting for losses of more than $675 million.
The two have been arraigned in a Georgia district court on charges relating to an elaborate voice- and SMS-phishing (i.e., vishing/smishing) scheme.
Ransomware adopts Process Doppelgänging technique to avoid antivirus researchers and avoid detection in a newly identified malware double threat targeting users in the U.S., Kuwait and Germany.