Z-Shave. Exploiting Z-Wave downgrade attacks
Z-Wave uses a shared network key to secure traffic. This key is exchanged between the controller and the client devices (‘nodes’) when the devices are paired. The keys are usedRead More →
Z-Wave uses a shared network key to secure traffic. This key is exchanged between the controller and the client devices (‘nodes’) when the devices are paired. The keys are usedRead More →
Feds take aim at potent VPNFilter malware allegedly unleashed by Russia. The FBI is advising users of consumer-grade routers and network-attached storage devices to reboot them as soon as possibleRead More →
This is a tool that allows you to create multiple TOR instances with load balancing traffic between them HAProxy. The tool provides a single endpoint for clients. Also, you canRead More →
A large number of information security experts are betting on a future with a great presence of voice assistants fed by artificial intelligence. Digital beings that would help us answer questions andRead More →
For all of us who have been curious to know what data has been collected and stored by Apple about us, it is now possible to know. Apple recently launchedRead More →
WMI and CIM are used for information management. Information security experts comment that some vendors use WMI to provide information. Now, we will concentrate on win32_product. The win32_product class provides information onRead More →
After an investigation, security professionals have found a backdoor account in the firmware of the D-Link DIR-620 routers; this allows malicious actors to take over any device accessible through theRead More →
A team of security experts explained; that this application, Dumpzilla, is developed in Python 3.x and is used with the aim of extracting all forensic information from the Firefox, IceweaselRead More →
A research team from the Tencent firm discovered several security vulnerabilities in BMW models. Tencent Keen Security Lab’s information security experts found 14 vulnerabilities that affect several BMW models, including models; BMWRead More →
A recent investigation revealed six vulnerabilities in Dell EMC RecoverPoint devices. One of the flaws found allows attackers to execute remote unauthenticated code with administrator privileges. A team of information security expertsRead More →