As the world’s major cities have deployed smart city, the IBM X-Force Red team and security operator Threatca have teamed up to examine the major
Category: Vulnerability
Cisco researchers show the latest attack methods for cryptocurrencies at Black Hat conference
With the continuous development of blockchain technology, various cryptocurrencies on the Internet have sprung up, and the rise of cryptocurrencies has provided many cybercriminals with
Hackers show to bypass macOS security alerts via “synthetic” clicks at DEFCON 2018
At the DefCon hacker conference held in Las Vegas on Sunday, the former National Security Agency employee, well-known Mac computer hacker Patrick Wardle, through so-called
Hackers showcase how to penetrate a brand new MacBook at a Black Hat
Apple’s devices have always been considered quite secure, but it may not be precisely the case. For example, a brand new MacBook is easily hacked.
Hacker demonstrates a life-threatening electric shock from a pacemaker
Safety researchers say that cardiac pacemaker manufacturer Medtronic does not use encryption to protect firmware updates, allowing hackers to install malicious firmware to endanger the
Hackers found many security flaws in Apple products, but have no bug bounty
A Google security researcher said that he had discovered 30 vulnerabilities in Apple’s iOS operating system since 2016. These vulnerabilities make Apple’s software more secure
Expired SSL certificates in the Cisco VPN will disrupt network configuration
Anyone running a Cisco-supported virtual private network (VPN) may need to install an update to make sure everything is working. This is because Cisco inadvertently
Researchers show how to bypass Windows 10 lock screen through Cortana
At the Black Hat conference in Las Vegas this week, security researchers Amichai Shulman and Tal Be’ery from Kzen Networks revealed that Cortana vulnerabilities could be used to
Researcher: satellites systems are vulnerable, hackers can conduct microwave-like attacks
A security researcher warned that satellite systems used by aircraft, ships and the military contain security vulnerabilities that could allow hackers to control them. The most
Medical practice management software OpenEMR exist 22 vulnerabilities
On Tuesday (August 7th), a group of researchers publicly disclosed 22 security vulnerabilities that existed in OpenEMR software. OpenEMR is a widely used medical practice
CVE-2018-5390 – SegmentSmack: Linux Kernel Denial of Service Attack Vulnerability
Recently, the Linux kernel was exposed to a Denial of Service Attack Vulnerability (CVE-2018-5390) SegmentSmack. A remote attacker could exploit this vulnerability to trigger tcp_collapse_ofo_queue() and
New method to crack Wi-Fi WPA2 encryption takes an average of 10 minutes
With the frequent occurrence of various events such as Wi-Fi hijacking, it is not difficult to realize that traditional Wi-Fi is no longer secure. Recently,