Critical flaws revealed to affect most Intel chips since 1995 | ZDNet

Another huge blow for Intel. The critical flaws in Intel processors allow attackers to gain access to the entire memory...

Acoustic Denial of Service Attacks on HDDs

Another interesting side-channel attack. Using essentially sound to degrade hard disk performance. In the extreme case you can cause applications...

Huge security flaw lets anyone log into a High Sierra Mac

Huge security flaw lets anyone log into a High Sierra Mac

This is as bad as it gets. While Apple’s hardware is still top-notch, the quality of their software – especially...

Experts can hack most CPUs since 2008 over USB by triggering Intel Management Engine flaw

Experts can hack most CPUs since 2008 over USB by triggering Intel Management Engine flaw

Gaining full privileged access to the CPU just by plugging in a USB device? This is as serious as it...

A penetration tester’s guide to sub-domain enumeration

Sub-domain enumeration is one of the techniques used in penetration testing. The following article gives a good guide on how...

Key Reinstallation Attacks – Breaking WPA2 by forcing nonce reuse

A serious weakness in WPA2 can cause sensitive information transmitted over Wifi to be read. KRACK attack is especially bad...

Accenture left a huge trove of sensitive data on exposed servers

Quite unforgiveable for a company that does cloud consultancy. According to Vickery, the largest server contained over 137 gigabytes of...

Computer virus hits US Predator and Reaper drone fleet

Computer virus hits US Predator and Reaper drone fleet

What could possibly go wrong.. A computer virus has infected the cockpits of America’s Predator and Reaper … Source: Computer...

Wanted: Weaponized exploits that hack phones. Will pay top dollar

Wanted: Weaponized exploits that hack phones. Will pay top dollar

Lucrative exploit market might just swing more people over to the dark side. Exploit broker Zerodium ups the ante with...

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17