The Latest in IT Security

Posts Tagged ‘Exploit’

To Mark Loveless, an internet-enabled cordless drill seemed like a perfect recipe for an IoT security nightmare. Duo Security’s senior security researcher confessed that it sounded silly and quite possibly part of a push by the electronics maker to inject “smarts” into devices that ultimately turned them into hackable punching bags for adversaries to exploit.

Read more ...

After a recent investigation, Mexican NGOs allege that the Mexican government is deploying sophisticated mobile spying software on local journalists, lawyers and activists. Using fake custom messages, such as news, pictures and text messages to lure victims into clicking various URLs, a series of zero-day vulnerabilities would be exploited to allow remote control of the targeted devices.

Read more ...

Has your Windows machine been implanted with NSA’s DoublePulsar backdoor? If you haven’t implemented the security updates released by Microsoft in March, chances are good that it has.

What is DoublePulsar?

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments