Zero-day flaws in IoT baby monitors could give attackers access to camera feeds
Customers should ‘stop using devices altogether’, say researchers [...]
Customers should ‘stop using devices altogether’, say researchers [...]
Enter the tar pit [...]
Stalkers and domestic abusers can use app to ‘stealthily track’ victims, says watchdog [...]
Non-profit reveals more favorable results than those uncovered by similar review last year [...]
Security consulting firm insists no student gained an unfair advantage [...]
Thousands of victims involved as separate report warns of wider rise in brute-force attacks against accounts [...]
Monetary rewards for ethical hackers [...]
New web targets for the discerning hacker [...]
Patched authentication bypass comes in wake of widespread exploitation of ‘ProxyShell’ vulnerabilities [...]
Developers revoke YAML support to protect against exploitation [...]
Researchers say the issue has been exploitable for ‘months’ [...]
Malicious hackers could access and delete footage or disable cameras [...]
Healthcare provider hit by cyber-attack earlier this month [...]
Romanian national sent down after admitting vishing, phishing, and money laundering rackets [...]
Attack built on previous Tinder exploit earned researcher – and ultimately, a charity – $2k [...]
Data leak might be linked to ransomware gang's data dump [...]
Datawing disavows CSP nonce legal offensive [...]
One of two deleted credits was for the most frequently targeted flaw of 2020 [...]
Microsoft makes OData APIs privacy-preserving by default after revelations [...]
Memorandum of Understanding will strengthen knowledge sharing practices [...]
Helix unwound as bitcoin tumbler kingpin faces long prison sentence [...]
Immediate triage urged as researchers warn in-the-wild exploitation likely [...]
Routers compromised to run attacks, plant ransomware [...]
Attackers gained access to St. Joseph’s/Candler network in December last year [...]
Cyber.org leads program to bring better cybersecurity to US classrooms [...]