Tag: Vulnerabilities
You are here: Home \ Vulnerabilities \ Page 11
The attack allows malicious applications to break out of their sandbox and access the entire operating system, giving an adversary complete control of the targeted device.
The planned threading in shared memory update gives bad actors a way around the timer mitigations released by browser vendors.
A PoC shows how ships could be hacked and fooled into changing direction – all due to simple security issues.
The Roku streaming video device and the Sonos Wi-Fi speakers suffer from the same DNS rebinding flaw reported in Google Home and Chromecast devices earlier this week.
Attackers use the approach to look like legitimate traffic and hide data exfiltration in plain sight.
The onus behind IoT security has become so muddled that no one knows who to point fingers at.
Researchers were able to discover a way to hack the device in less than an hour.
The IP cameras have a slew of bugs allowing bad actors to control them, add them to a botnet, or render them useless.
World Cup travelers should leave their mobile phones, laptops and tablets behind.
A draft document lays out its criteria for addressing various flaws and notes the exceptions.
... 789101112131415 ... 18 ... 27 ... 36 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ...