Search Results for: devices vulnerabilities Blog Post New Malware Samples Show Apple Isn’t Invulnerable to Attacks February 1, 2022 Apple devices are often preferred for their tighter security than devices from its biggest competitors, Samsung and Windows. However, recently... Blog Post Bluetooth LE Powered Devices are Affected by 12 Vulnerabilities February 20, 2020 Cybersecurity researchers discovered 12 potential security vulnerabilities that are considered severe last week. These vulnerabilities, which are identified as “SweynTooth”... Blog Post Bluetooth Vulnerability Impacting Most Android Devices is Now Patched February 12, 2020 Google this week released a report regarding Android security and announced 13 vulnerabilities got patched. A major Bluetooth vulnerability that... Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an... Blog Post Thunderclap Vulnerability Affects Peripheral Devices March 2, 2019 Hackers have weaponized peripheral devices to launch their attacks. The vulnerabilities dubbed, Thunderclap, have been spreading, affecting Apple devices exploits... Blog Post Can Mobile Devices get Malware? May 28, 2020 Mobile malware is malicious software which targets mobile devices, such as smartphones and tablets, with an aim of accessing private... Blog Post Working from home? Switch off Amazon’s Alexa (say lawyers) March 26, 2020 The outbreak of COVID-19 disrupted modern working life and brings us a new working style: Remote working. However, working from... Blog Post Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which... Blog Post Lack of Corporate Firewalls Lead to The Rise In Malicious Device Activity April 30, 2020 According to the latest research, the number of organizations whose equipment has been damaged and forced to engage in malicious... Blog Post An IoT Leak Impacts On 2.4 Million Customers December 27, 2019 Today, an IoT company named Wyze announced and confirmed a server leak led by an accidentally exposed internal database. This... Blog Post Mobile Banking Users are Targeted By SMS-based Phishing Attacks February 21, 2020 Nowadays, mobile banking users are easily attacked by hackers with the auto-generated SMS tool. This tool will create unique fake... Blog Post Children’s Connected Toys Could be Hacker’s Target December 20, 2019 Nowadays, it is not surprising to hear that a lot of devices are having vulnerabilities, especially the IoT devices. However,... Blog Post LIFARS Insights: 0-day Flaws in LILIN IP cameras and DVRs exploited in the wild March 26, 2020 The rise in IoT devices is something that hackers are increasingly looking to exploit. There will be approximately 25 billion... Blog Post A Safer IoT connected Christmas Light is Now Available December 18, 2019 Thinking about follow the Internet of Things trend, and decorate your tree with smart Christmas lights? IoT Christmas lights allow... Blog Post “Corona Antivirus” Software is Distributing Malware Backdoor March 28, 2020 Even though the whole world is now worrying about the outbreak of COVID-19, hackers never stop attacking. In the Internet...
Blog Post New Malware Samples Show Apple Isn’t Invulnerable to Attacks February 1, 2022 Apple devices are often preferred for their tighter security than devices from its biggest competitors, Samsung and Windows. However, recently...
Blog Post Bluetooth LE Powered Devices are Affected by 12 Vulnerabilities February 20, 2020 Cybersecurity researchers discovered 12 potential security vulnerabilities that are considered severe last week. These vulnerabilities, which are identified as “SweynTooth”...
Blog Post Bluetooth Vulnerability Impacting Most Android Devices is Now Patched February 12, 2020 Google this week released a report regarding Android security and announced 13 vulnerabilities got patched. A major Bluetooth vulnerability that...
Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an...
Blog Post Thunderclap Vulnerability Affects Peripheral Devices March 2, 2019 Hackers have weaponized peripheral devices to launch their attacks. The vulnerabilities dubbed, Thunderclap, have been spreading, affecting Apple devices exploits...
Blog Post Can Mobile Devices get Malware? May 28, 2020 Mobile malware is malicious software which targets mobile devices, such as smartphones and tablets, with an aim of accessing private...
Blog Post Working from home? Switch off Amazon’s Alexa (say lawyers) March 26, 2020 The outbreak of COVID-19 disrupted modern working life and brings us a new working style: Remote working. However, working from...
Blog Post Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which...
Blog Post Lack of Corporate Firewalls Lead to The Rise In Malicious Device Activity April 30, 2020 According to the latest research, the number of organizations whose equipment has been damaged and forced to engage in malicious...
Blog Post An IoT Leak Impacts On 2.4 Million Customers December 27, 2019 Today, an IoT company named Wyze announced and confirmed a server leak led by an accidentally exposed internal database. This...
Blog Post Mobile Banking Users are Targeted By SMS-based Phishing Attacks February 21, 2020 Nowadays, mobile banking users are easily attacked by hackers with the auto-generated SMS tool. This tool will create unique fake...
Blog Post Children’s Connected Toys Could be Hacker’s Target December 20, 2019 Nowadays, it is not surprising to hear that a lot of devices are having vulnerabilities, especially the IoT devices. However,...
Blog Post LIFARS Insights: 0-day Flaws in LILIN IP cameras and DVRs exploited in the wild March 26, 2020 The rise in IoT devices is something that hackers are increasingly looking to exploit. There will be approximately 25 billion...
Blog Post A Safer IoT connected Christmas Light is Now Available December 18, 2019 Thinking about follow the Internet of Things trend, and decorate your tree with smart Christmas lights? IoT Christmas lights allow...
Blog Post “Corona Antivirus” Software is Distributing Malware Backdoor March 28, 2020 Even though the whole world is now worrying about the outbreak of COVID-19, hackers never stop attacking. In the Internet...