A feature in Microsoft Word that allows for the loading of sub-documents from a master document can be abused by attackers to steal a user’s credentials, according to Rhino Security Labs.
A feature in Microsoft Word that allows for the loading of sub-documents from a master document can be abused by attackers to steal a user’s credentials, according to Rhino Security Labs.
Researchers at Rhino Security Labs identified a flaw in Amazon’s Key delivery service and Cloud Cam security camera that allows a rogue carrier to tamper with the camera and knock it offline, making it appear no one is entering the home when that’s not the case. Read More
Earlier this month, security researcher Benjamin Caudill unveiled a new, cheap anonymizing device called Proxyham that set the security press a-buzz. Caudill noted that while technologies such as TOR can provide a certain level of anonymity, there exists “a fundamental flaw”: the direct relationship between IP address and physical location. Proxyham’s promise: to enable whistleblowers, […]
Latest Comments