Tag: Vulnerabilities
You are here: Home \ Vulnerabilities \ Page 5
Apple 0-Day allows hackers to mimic mouse-clicks for kernel access, despite mitigations.
LAS VEGAS – In recent years there has been more attention paid to the security of medical devices; however, there has been little security research done on the unique protocols used by these devices. Many of the insulin pumps, heart monitors and other gadgets found in hospital rooms use aging protocol to communicate with nurses’...
Straight from Black Hat 2018: How TRITON disrupted safety systems and changed the threat landscape of industrial control systems, forever.
More than a dozen flaws in smart-city gear could open the door to attackers bent on sowing public panic, according to IBM X-Force.
Project Zero researcher highlights stubborn iOS bugs as an example of why Apple and the rest of the industry needs to take a fresh approach to securing systems.
At Black Hat, Google’s Parisa Tabriz discussed how to navigate the complex security environment with long-term thinking and a policy of open collaboration.
Rather than eliminating bugs, the idea is to add large numbers of non-exploitable bugs to software as decoys to waste cyber-criminals’ time.
A Black Hat talk demonstrates the ease of poking holes in firewalls: How to break, bypass and dismantle macOS firewall products.
The new strategy allows an attacker to instead lift ID information directly from the router, within minutes.
Half of breached firms say they were compromised due to a vulnerability for which a patch was available but not applied.
123456789 ... 18 ... 27 ... 36 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ...