Blog: In The News
You are here: Home \ Blog
Researchers crack voice authentication systems by recreating any voice using under ten minutes of sample audio.
Vulnerabilities in healthcare devices and hospital systems are leading to growing concerns in the infosec community about patient safety.
Straight from Black Hat 2018: How TRITON disrupted safety systems and changed the threat landscape of industrial control systems, forever.
More than a dozen flaws in smart-city gear could open the door to attackers bent on sowing public panic, according to IBM X-Force.
Researchers create PoC of a post-exploitation kernel-mode fileless attack technique.
Reverse engineering the Toshiba FlashAir SD storage card allowed a researcher to execute remote code – and could’ve allowed him to add other malicious or practical features.
Government entities and educational institutions in the Middle East are under attack in an ongoing credential-harvesting campaign.
A flaw in Cortana allowed researchers to take over a locked Windows machine and execute arbitrary code.
Project Zero researcher highlights stubborn iOS bugs as an example of why Apple and the rest of the industry needs to take a fresh approach to securing systems.
In mixed-design radio chips the processor’s activity leaks into the analog portion of the chip – and is broadcast as output.
... 67891011121314 ... 18 ... 27 ... 36 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ... 135 ... 144 ... 153 ... 162 ... 171 ... 180 ... 189 ... 198 ... 207 ... 216 ... 225 ... 234 ... 243 ... 252 ... 261 ...