An unusual method of stealing data from surveillance cameras
We explain in simple terms research demonstrating a vulnerability in modern digital video cameras.
8 articles
We explain in simple terms research demonstrating a vulnerability in modern digital video cameras.
What is a man-on-the-side attack, and how does it differ from a man-in-the-middle attack?
Researchers find a new reliable way to track the location of wireless Wi-Fi devices.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
Cybercriminals are using steganography to hide their code and seek industrial data.
A lightbulb is all the specialist equipment Lamphone needed to eavesdrop on a conversation in a soundproofed room.
A malware that cannot be wiped from the victim’s hard drive does exist. However, it’s so rare and expensive, that you probably won’t ever encounter it.
Microsoft moves against a malware-supporting webhosting company, NoIP, causing collateral damage in the process. The Miniduke APT campaign returns.