D-Link has published beta patches for vulnerabilities in the firmware of many of its IP surveillance cameras, which could allow a hacker to intercept a video stream. The company said on its support forum that it will publish a full ...
Tags: D-Link, Beta Patches, IP Camera
D-Link has published beta patches for vulnerabilities in the firmware of many of its IP surveillance cameras, which could allow a hacker to intercept a video stream. The company said on its support forum that it will publish a full ...
Tags: D-Link, Beta Patches, Computer Products
Ninety per cent of passwords are vulnerable to hacking because even supposedly secure passwords typically share common characteristics. Because people are required to generate so many passwords with particular characteristics - at least ...
Tags: Computer Products, hacking
The cyber attack Friday on the Internet deal site LivingSocial that forced it to reset the passwords of some 50 million users has elements of what's becoming an all too familiar storyline. Along with the names, birth dates, and email ...
Tags: Computer Products, cyber attack
Thousands of older systems, including those used to manage critical industrial control equipment, traffic lights, fuel pumps, retail point-of-sale terminals and building automation are vulnerable to tampering because they're insecurely ...
Tags: Computer Products, software
Image courtesy of Australian Customs and Border Protection Service. The World Customs Organisation and GS1 will be present at the upcoming 7th Global Congress on Combating Counterfeiting and Piracy, to be held in Istanbul, Turkey from ...
A malfunctioning log-in system affected millions of people's ability to access a variety of Google applications on Wednesday, including Gmail and Drive. The problem, which lasted for about three hours on Wednesday morning, occurred when ...
Tags: Google, Computer Products
Thirteen popular home and small office routers contain security problems that could allow a hacker to snoop or modify network traffic, according to new research. Independent Security Evaluators (ISE), a security consultancy based in ...
Security researchers from Russian cybercrime investigations company Groub-IB have recently identified a new piece of malware designed to steal login credentials from specialized software used to trade stocks and other securities online. ...
Tags: Researchers, Trading Software
Following similar initiatives by Apple, Google and Facebook, Microsoft is enabling two-factor authentication for its Microsoft Account service, the log-on service for many of its online and desktop products. "With this release you can ...
Tags: Microsoft, Computer Products, software
The CEO of archiving service Evernote this week said his company will soon release branded hardware with partners, as it moves toward creating its own devices. "We won't actually do the manufacturing, but we'll do the co-design together," ...
Tags: Computer Products, Hardware
Following?similar initiatives?by Apple, Google and Facebook, Microsoft is enabling two-factor authentication for its Microsoft Account service, the log-on service for many of its online and desktop products.? "With this release, you can ...
Tags: Computer Products, Microsoft
Oracle released?128 patches on Tuesday,?covering security weaknesses that affect "hundreds" of its products. Four of the patches concern components of Oracle's flagship database server, and all of them can be exploited by a remote ...
Tags: software, Computer Products
A lawsuit could put a crimp in Microsoft's reported plans to implement two-factor authentication for users of its consumer cloud services. Two-factor authentication – which supplements a user's password with a PIN or code generated ...
Machine vision systems supplier Cognex has unveiled a new version of the In-Sight Track & Trace identification and data verification solution for healthcare serialization. The latest version is a follow-up to deployments of In-Sight Track ...