Users of Amazon Ring doorbell were found to be in danger of having their home internet invaded by hackers, as the doorbell comes with a serious security flaw.
Here at a session at DEF CON on Thursday, the researchers shed light on their work "breaking" Google Home. What made the talk unique wasn't necessarily that Google Home smart speakers could be compromised using Megellan - that was public news in Dec. 2018 - rather it was how the hack was pulled off.
Researchers have devised a simple attack that might cause a Tesla to automatically steer into oncoming traffic under certain conditions. The proof-of-concept exploit works not by hacking into the car's onboard computing system, but by using small, inconspicuous stickers that trick the Enhanced Autopilot of a Model S 75 into detecting and then following a
WordPress this week addressed a vulnerability that could allow an unauthenticated attacker to execute code remotely and take over vulnerable websites.
Proof-of-concept (PoC) code is now publicly available for a recently disclosed container escape vulnerability impacting popular cloud platforms, including AWS, Google Cloud, and numerous Linux distributions.
Microsoft Exchange 2013 and newer versions are vulnerable to a privilege escalation attack that gives anyone with a mailbox a way to gain domain administrator rights at potentially 90% of organizations running Active Directory and Exchange, according to a security researcher.
New York officials have launched an investigation into Apple's FaceTime bug that allowed iPhone users to hear through someone else's iPhone without permission.