Four vulnerabilities in FL SWITCH industrial switches could have enabled hackers to disconnect critical devices from an industrial network, it has been disclosed.
Giant IoT botnet malware targeting routers keeps getting worse, with an ever-expanding list of devices vulnerable to attack.
Smartphones from ZTE, MediaTek, Archos and Blaupunkt found with adware. Thousands of Android devices are thought to harbour nasty adware that comes pre-installed.
A potentially highly destructive malware is estimated to have infected at least 500,000 networking devices in at least 54 countries since as far back as 2016, in what could be the prelude to a massive attack.
Armor for Android resurfaces as Android's Antivirus. A fake anti-virus app has re-emerged on Android devices, according to security researchers.
Critical vulnerability allows attackers to bypass authentication. Security researchers have found flaws in fibre-optic broadband routers that enable hackers to bypass security and takeover devices.
All the tools reviewed allow organisations to collect, sift through and interact with the mounds of information and events generated by networks and devices, says technical writer Dan Cure.
Microsoft has released two updates as part of the company's on-going effort to secure devices running Intel processors from the Spectre vulnerability.
It has long been established that plugging one's iPhone into an unknown computer or hardware device exposes that mobile phone to potentially malicious cyber-activity.
Other instant messaging apps also targeted by malware. Researchers have discovered a new type of Android malware that steals data from instant messaging apps on Android devices.
Israel-based Cellebrite reportedly privately announced the capability to subvert the security of iOS 11 enabled devices including the latest iPhone, iPad, iPad mini, iPad Pro and iPod touch.
The French government has floated a proposal to make manufacturers of internet-connected devices liable for the security of their devices while they are on the market.
Cyber-attacks against IoT devices have grown markedly over the past two years, prompting a warning from Interpol that nearly any IoT device - from refrigerators to smartphones - is vulnerable to attack.
Drive-by cryptomining campaigns were spotted targeting millions of Android devices via infected apps and malicious browser redirects.
Malicious cryptominers are going mobile and beyond with a new botnet malware targeting Android-based devices that expose debug capabilities to the internet, for the purpose or mining Monero.
Amazon is issuing a security patch for its "Key"services shortly after a researcher posted a video demonstration of them claiming to hack the Amazon device using a Raspberry Pi.
Security researchers have found a new botnet that uses flaws connected to the Satori botnet and uses hosting services running multiplayer versions of Grand Theft Auto to infect IoT devices.
Autosploit, a new tool that basically couples Shodan and Metasploit, makes it easy for even amateurs to hack vulnerable IoT devices.
Nexus Zeta behind botnet that weaponises router exploit to enlist further vulnerable IoT devices. The author of Satori botnet may also be behind two new Mirai variants called Masuta and PureMasuta.
An emerging botnet comprised of compromised IoT devices dubbed "Hide 'N Seek" or HNS is using custom built Peer-to-Peer communication to exploit victims and build its infrastructure.
Three Sonic the Hedgehog games for Android devices that collectively have been downloaded well over a hundred million times are leaking users' geolocation and device data to uncertified servers.
A pair of flaws dubbed Meltdown and Spectre that take advantage of the speculative execution performance feature in modern CPUs make the memory of virtually all computers and devices accessible to hackers.
The code that exploits a flaw in Huawei, a router that enables these devices to be turned into botnets to push Satori and Brickerbot has been publicly posted on Pastebin.
Unlike Mirai, the IoTroop bot exploits nine core vulnerabilities as it spreads, and already, experts say those responsible for the bot - who remain unknown - have added more than 100 features to it.
A serious vulnerability in Android could put millions of devices at risk from attackers modifying code in applications without affecting their signatures.
Seven in ten people in the UK are being put off recycling old and unused electrical products because of concerns about personal security data breaches.
Rémy Cointreau faced a challenge to create a more agile organisation through its IT infrastructure, providing employees with the ability to securely access applications from any device at any time and from anywhere.
Trustwave researchers revealed a vulnerability in Brother consumer and business printers and multi-function devices that can allow a denial of service attack. Brother UK responds.
LG patches holes in its IOT device range following cooperation with CheckPoint, including patching vacuum cleaners which could have become digital spies in the home.
Popular IoT home security device could allow hackers to turn burglar alarms on and off and switch on siren, says researcher who dissected it.