Taking control of a network by hacking a Philips Hue bulb
An information security firm reported the finding of a new vulnerability in Philips Hue devices that, if exploited, would allow a hacker to take control of a light bulb toRead More →
An information security firm reported the finding of a new vulnerability in Philips Hue devices that, if exploited, would allow a hacker to take control of a light bulb toRead More →
Although rarely exploited, vulnerability testing reports on WhatsApp have become prevalent in the cybersecurity community. The most recent of these reports refers to multiple failures that could alter some aspectsRead More →
Technological devices developed and manufactured in China remain a threat to the privacy and data protection of users around the world. Recent reports state that Huawei installed a rudimentary andRead More →
Sometimes researchers and cybersecurity specialists don’t detect security flaws in some technological developments until they hit the market. In the worst cases, the first to detect these flaws or securityRead More →
What Is an SSL Certificate? SSL is Secure Sockets Layer but what does this actually mean? In its simplest terms it is the method by which information is protected whenRead More →
Reports on the detection of new vulnerabilities are constantly appearing, affecting multiple commonly used and specialized technology developments and products. One of the most recent vulnerability testing reports refers toRead More →
Most people still ignore it, but information from peripheral devices (mainly scanners and printers) can be accessed over the Internet. It sounds very bad, and can get even worse, asRead More →
For most cryptocurrency enthusiasts and digital forensics specialists, storing virtual assets without an Internet connection (a practice usually known as cold storage) is the most secure way to hold theseRead More →
Official app stores (Play Store and AppStore) sometimes fail to detect potentially malicious developments available on their platforms. One case that has caught the attention of researchers and experts inRead More →
The last six months have been of intense activity related to ransomware and cybercriminal groups that use this variant of malware to attack their victims. The Toll Group cybersecurity areaRead More →