Pwn2Own 2019 – Tesla Car Internet Browser Hacked – Hackers Won the Car &...

First and the second-day contest ended up with a various successful attempt to exploit the different bugs in multiple software vendors including, Microsoft, VMware, Oracle and Apple. In Pwn2Own 2019 final day, Zero...
car alarm

Hack the Car in Real Time – Car Alarm Flaw let Hackers Remotely Hijack...

Researchers discovered a serious Vulnerability in famous vendors car alarm system that allows attackers to hijack the car remotely and kill the engine while driving, even steal the car. These alarms available in the...
bathtubs

30,000 Hot Bathtubs are vulnerable to Remote Attack by Hackers

Researchers discovered a serious flaw in more than 30,000 IoT connected bathtubs that can be authenticated by remote attackers to control the vulnerable tub located in your home. Ceri Coburn , a company...

Most Important Cybersecurity Risk Mitigating for Connected Vehicles

Staying connected when managing or owning a fleet is crucial. It is the only way to have real-time data and the monitoring of performance. However, we all know the risks that come with Connected Vehicles. Cybersecurity threats are rampant...

HNS IoT Botnet Scanning & Exploits the Routers to Compromise the Victims Networks

HNS(Hide & Seek) IoT botnet attack victims network using router-based vulnerabilities such as  CVE-2016-10401 to propagate malicious code and steal the victim's sensitive information. HNS communication established through peer to peer network which one of the rare mechanism which is used by...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended