Remote Attack Could Damage Your Pebble Smartwatch Easily
Pebble, a wristwatch that can connect to your phone - both iOS and Android - and interact with apps, has a hard-coded vulnerability that allows a remote attacker to destroy your S…
Pebble, a wristwatch that can connect to your phone - both iOS and Android - and interact with apps, has a hard-coded vulnerability that allows a remote attacker to destroy your S…
An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact: most of them sport an SSL/TLS vulnerability that can be misused …
A new study conducted by security researchers at the University of Michigan demonstrated that it is easy to hack traffic light systems.
The way in which images attached to Facebook posts are refreshed can be abused to conduct distributed denial-of-service (DDoS) attacks using the site's high-bandwidth servers, a s…
RegRipper is a flexible open source tool that can facilitate registry analysis with ease. It contains pre-written Perl scripts for the purpose of fetching frequently needed inform…