IoT

Pwn2Own 2019 – Tesla Car Internet Browser Hacked – Hackers Won the Car & $545,000 in Total – Day 3

First and the second-day contest ended up with a various successful attempt to exploit the different bugs in multiple software…

6 years ago

Hack the Car in Real Time – Car Alarm Flaw let Hackers Remotely Hijack 3 Million Vehicles Globally

Researchers discovered a serious Vulnerability in famous vendors car alarm system that allows attackers to hijack the car remotely and…

6 years ago

30,000 Hot Bathtubs are vulnerable to Remote Attack by Hackers

Researchers discovered a serious flaw in more than 30,000 IoT connected bathtubs that can be authenticated by remote attackers to…

6 years ago

FreeRTOS IoT OS Critical Vulnerabilities Affected Million of Smart Home & Critical Infrastructure Based IoT Devices

A critical Vulnerabilities that affected FreeRTOS TCP/IP Stack puts millions of IoT devices at risk and let attackers allows to compromise the…

6 years ago

Most Important Cybersecurity Risk Mitigating for Connected Vehicles

Staying connected when managing or owning a fleet is crucial. It is the only way to have real-time data and…

7 years ago

HNS IoT Botnet Scanning & Exploits the Routers to Compromise the Victims Networks

HNS(Hide & Seek) IoT botnet attack victims network using router-based vulnerabilities such as  CVE-2016-10401 to propagate malicious code and steal the…

7 years ago

Key Ways to Stop Hackers From Invading Your Smart Home

If you’re like millions of other people around the world, you have at least one, if not many, smart home…

7 years ago

XMRig – New Cryptojacking Malware Attack on Apple Mac Devices

New Mac Cyptominer Malware  XMRig affected Mac users that cause a sudden increase of the CPU process called mshelper and…

7 years ago

100 Million IoT Smart Devices are Vulnerable to Z-Wave Wireless Communications Protocol Downgrade Attack

Z-Wave, a Wireless Communication Protocol that widely used in IoT Smart Devices vulnerability allow attackers to perform Downgrade Attack and…

7 years ago

Multiple Vulnerabilities in D-Link Routers Allows Hackers Gain Complete Control & Extract Sensitive Data

Set of 4 Vulnerabilities are discovered in D-Link DIR-620 firmware that allows an attacker to exploit with the hardcoded default…

7 years ago