Archives: May 2018
You are here: Home \ 2018 \ May \ Page 2
Virtual machines that use AMD’s hardware-based encryption scheme are vulnerable to attacks that can extract the full contents of their main memory – in plaintext.
Attack uses ultrasonic sound waves to disrupt HHD read/write operations, which could lead to a system crash.
An exploit for the bypass vulnerability required an HTTP parameter pollution in a web application.
Researchers have discovered a banking trojan making waves in Brazil with an array of tricks up its sleeve, including using an unusual command and control (C&C) server.
Telcom firm leaves port open on customer routers after maintenance update exposing hundreds of customers to possible attack.
The threat actors behind widespread attacks on banks and ATM jackpotting campaigns in Russia and Europe resurfaced in may, attacking banks.
Millions of IoT devices based on the Z-Wave wireless protocol are vulnerable to a downgrade attack during pairing sessions.
Several well-rated pet trackers contain flaws stemming from the use of Bluetooth LE, poor certificate handling and more.
After an Alexa speaker recorded and shared a private conversation, the tech community is casting a wary eye on voice assistant privacy issues.
As the popularity around cryptocurrency has continued to rise in 2018, it has also paved an easy path for cash-hungry scammers to launch “cryptocurrency giveaway scams.”