Many systems are vulnerable: Researchers at the time said that they were able to launch inaudible commands by shining lasers…
In episode 149 for November 30th 2020: Police begin to pilot a program to live-stream Amazon Ring cameras, new details…
Amazon informed some of its customers about a security incident that involved the unauthorized disclosure of their email addresses. News…
In episode 134 for August 17th 2020: Details on new critical vulnerabilities found in Amazon Echo devices, what the end…
By Roger Cheeks, US-East Sales Engineer, Corelight Corelight is a powerful network traffic analysis tool that enables network detection and…
The popular TikTok app was deemed a security risk by Wells Fargo, and its employees have been told to delete…
A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous…
In episode 126 for June 22nd 2020: Details on the largest Distributed Denial of Service attack ever recorded, new security…
In episode 96 of our monthly we discuss the controversy of voting by smartphone in our elections, the Jeff Bezos…
Motherboard obtained and published the technical report on the hack of Jeff Bezos's phone, which is being attributed to Saudi…