The Finland-based security consultancy discovered vulnerabilities affecting over 150 different HP multifunction printer products. Attackers can exploit the flaws to seize control of devices, steal information, and further infiltrate networks to inflict other types of damage, according to F-Secure's research...
Counterfeit hardware, especially in corporate settings, is a recurring problem that often goes unnoticed. Having such gear online poses serious financial, operational, and security risks. Cybersecurity company F-Secure has released an investigative report detailing counterfeit Cisco Catalyst 2960-X...
Consumers are becoming increasingly concerned about the hacking of their devices and data as they hear about more data breaches and have their own experiences with issues such as ransomware, identity theft and botnet attacks. Concerns about data security also have been shown to increase with ownersh...
A flaw in certain electronic hotel door locks could allow hackers to access guest rooms and other secure locations at millions of properties around the world, F-Secure researchers have discovered. Software updates were issued to fix the flaw in the smart locks after F-Secure notified and worked with...
Norton by Symantec on Tuesday announced the Norton Core secure router for smart devices in the connected home at CES. The router protects up to 20 PCs, Macs, Android and iOS smartphones and tablets on a home network, and unlimited devices connected to the IoT. It will update its firmware in backgrou...
Facebook top dog Mark Zuckerberg had several of his social media accounts breached and defaced, according to reports that surfaced Sunday. Zuckerberg's Twitter, LinkedIn and Pinterest memberships were hacked, but evidence of the attacks quickly disappeared. In addition to requiring passwords, Twitte...
The Internet Archive on Friday cut the ribbon on its online Malware Museum, an online compendium of malware programs computer users in the 1980s and 1990s sometimes encountered. Everything old is new again, so the saying goes, and apparently that retro fascination applies to computer viruses. The mu...
Drive-by attacks on the Internet are a particularly pernicious form of online threat, especially for individual Web surfers. On the corporate level, though, a company with good endpoint protection software can foil the malicious practice. A drive-by occurs when an infected website automatically down...
The United States National Security Agency, which is known for monitoring landline, Web and cellphone communications worldwide, reportedly also targets wireless carriers. Documents released by whistle-blower Edward Snowden show the NSA has monitored more than 1,200 email accounts associated with maj...
Turla, a Trojan that has infected hundreds of 32- and 64-bit Windows computers at government institutions, embassies, military installations, educational institutions, and research and pharmaceutical companies over the years, has been found on Linux systems, Kaspersky Lab reported. The company has d...
Good - It's entertaining and makes sporting events more interesting.
Bad - It increases the risk of gambling addiction and financial loss.
Neutral - The benefits and drawbacks are equally significant.
Enter your Username and Password to sign in.