If you're watching TV and the channel suddenly changes, you may not have sat on the remote control by accident. Researchers with the security consultancy ReVuln in Malta have found a vulnerability present in most TVs made by Samsung ...
Tags: Samsung, TV, software, malicious software, LED 3D TV
A security researcher claims that he found 23 vulnerabilities in industrial control software from several vendors after a different security company last week showcased vulnerabilities in applications from some of the same manufacturers, ...
Tags: security researcher, vulnerabilities, industrial control software
CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows potential attackers to execute sensitive commands on the vulnerable devices without the need for ...
Tags: CoDeSys, software, ICS, vulnerability
Computerworld - Security consulting firm SecureState today released a new open source hacking tool that it claims will let security researchers and penetration testers verify the security of electric utility smart meters being installed in ...
Tags: SecureState, Termineter, OptiGuard, Spencer McIntyre
The U.S. government needs a comprehensive doctrine addressing cybersecurity instead of the current patchwork of policies and agencies dealing with cyberthreats, according to a group of experts. The lack of an overarching cybersecurity ...
Tags: U.S.government, cybersecurity, cyberthreats, experts
An increasing number of vulnerability researchers will focus their attention on industrial control systems(ICS)in the year to come,but so will cyberattackers,security experts believe. Control systems are made up of supervisory software ...
Tags: SCADA security, ICS, critical infrastructure, control systems
Security researcher Michael Coppola demonstrated how small and home office (SOHO) routers can be compromised and turned into botnet clients by updating them with backdoored versions of vendor-supplied firmware. Coppola, who is a security ...
Tags: SOHO routers, botnet clients, backdoored versions, firmware
CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows potential attackers to execute sensitive commands on the vulnerable devices without the need for ...
Tags: Digital Bond, Flaw, patch, vulnerability, control systems
A group of hackers has released a file containing unique identification data for over 1 million Apple iOS devices and claim that the information is part of a larger database stolen from the compromised laptop of an FBI agent. "During ...
Tags: group of hackers, database, unique identification data, FBI agent
The U.S. government needs a comprehensive doctrine addressing cyber security instead of the current patchwork of policies and agencies dealing with cyber threats, according to a group of experts. The lack of an overarching cyber security ...
Some cloud providers fail to detect and block malicious traffic originating from their networks, which provides cyber criminals with an opportunity to launch attacks in a botnet-like fashion, according to a report from security consultancy ...
Tags: cloud provider, network, security consultancy, BAE System
New facility is largest abroad investment on a semiconductor facility South Korean technology giant Samsung has begun the construction of $7bn memory chips manufacturing facility in North Western China's Xi'an region. Being ...
IDG News Service - Security researcher Felix "FX" Lindner has a more compelling reason to steer clear of routers from Huawei Technologies than fears about its ownership. While the company blasted for its opaque relationship with China's ...
Tags: Huawei, ownership, China's government
Computerworld Hong Kong - At a Computerworld Hong Kong event years ago, I heard a senior executive explain how online retailer Amazon re-engineered their e-commerce process for the Christmas gift-giving season. Like many retail ...
Tags: Amazon, hackers, MS, reddit, Miss Hong Kong