•  
  • By Ionut Ilascu
  • July 6th, 2015

AirLive IP Cameras Vulnerable to Command Injection

Attackers could take complete control of the device

  •  
  • By Catalin Cimpanu
  • June 22nd, 2015

Google's Chromium on Debian Is Listening In on Your Conversations

A masked Chromium extension turns on the user's microphone and enables the browser's audio capture feature

  •  
  • By Ionut Ilascu
  • June 12th, 2015

Malware Downloader Spread Via MERS-Themed Spam

More attacks piggibacking on MERS outbreak are expected

  •  
  • By Ionut Ilascu
  • June 11th, 2015

Encryption Keys Hard-Coded in Industrial Access Point

Security flaw has yet to be repaired, vendor unresponsive

  •  
  • By Ionut Ilascu
  • April 6th, 2015

Facebook Post Scheduler phpSFP Affected by SQL Injection Flaw

Latest and previous versions of the script are impacted

  •  
  • By Ionut Ilascu
  • March 23rd, 2015

Flash Player Vulnerable to Bug Patched in 2011

Free tool available to identify SWFs that need mending

  • By Ionut Ilascu
  • February 10th, 2015
  •  

About 40,000 MongoDB Databases Found Open Online

Students find no mechanisms protecting the databases

  • By Ionut Ilascu
  • February 6th, 2015
  •  

Ektron CMS Allows Unauthorized File Reading, Execution of Arbitrary Code

No practical solution has been provided, yet

  • By Ionut Ilascu
  • February 3rd, 2015
  •  

Suspended Facebook Account Scam Points to Malware

Malware has also been flung as a fake Java update

  • By Ionut Ilascu
  • February 3rd, 2015
  •  

Same-Origin Policy Bypassed in Internet Explorer UPDATED

Proof-of-concept works with the latest builds of the browser

 
Want more? Browse: