Amazon’s Blink Smart Security Cameras Vulnerable to Attacks
Researchers from vulnerability detection firm Tenable discovered seven critical vulnerabilities in Amazon-owned Blink XT2 security camera systems. If exploited, the vulnerabilities could allow hackers...
Trend Micro’s 2020 Predictions – Escalating Cloud and Supply Chain Risk
Trend Micro Incorporated today announced its 2020 predictions report, which states that organizations will face a growing risk from their cloud and the supply...
LA Attorney Urges People to Avoid Public Charging Stations
The Los Angeles District Attorney urged travelers to avoid public USB power charging stations in hotels, airports, and other public locations. In a security...
Researchers find vulnerability in Amazon’s Ring Video Doorbells
Security researchers stated that a flaw in Amazon’s Ring Video Doorbell Pro IoT device could have given hackers unauthorized access to the user's wi-fi...
Smart Bulbs can be Hacked!
Internet-enabled smart lighting products offer several novel functionalities over traditional lamps. But a recent survey revealed these connected lights can be maliciously used to...
The Krack on Amazon’s Kindle and Echo
From creepy laughs to spy bugs, Amazon’s Echo devices have been in the limelight for more than a dozen or two reasons, and it...
Magecart Hackers Group Strikes Again!
A malicious hacking group named Magecart Group 5 (MG5) is reportedly taking control over the layer 7 (L7) public Wi-Fi routers typically deployed in...
Hackers take over Smart Home
With technology making lives easy day by day, cybercriminals too are finding innovative ways to get into our lives. Along with the ease of...
How Tesla has always vouched for safe and secure cars
By Augustin Kurian
Until the late 2000s, electric cars had a reputation for being ugly and slow. This was until a small Silicon Valley startup...
Why You Should Stop Borrowing Someone’s Charger
Cybersecurity experts stated that using someone else charging cable might bring threats to your mobile devices. Attackers could exploit charging cables/cords to access sensitive...