IP Cameras image

7 Vulnerabilities in 400 Axis Camera Models Unearthed (CVE-2018-10658)

Several critical vulnerabilities have been uncovered in some 400 Axis camera models. The flaws could allow hackers to take full control over the affected camera or entangle them in botnets. VDOO researchers ...
CVE-2018-8235: Security Feature Bypass Bug in Edge, Patch Now!

CVE-2018-8235: Security Feature Bypass Bug in Edge, Patch Now!

An independent security researcher has uncovered by accident quite the unusual, high-severity browser vulnerability in Microsoft Edge, identified as CVE-2018-8235. Shortly put, the vulnerability would allow a malicious website to recapture content ...

Google’s Newest Feature: Find My Home

The commoditization of personal data in recent years has created huge opportunities for anyone with the skills to collect, catalogue and correlate every aspect of our lives. For many years now, there ...
CVE-2018-3665 Vulnerability Found in Intel Core and Xeon Processors

CVE-2018-3665 Vulnerability Found in Intel Core and Xeon Processors

Yet another chip vulnerability has been discovered, CVE-2018-3665, which has been called Floating Point Lazy State Save/Restore. The flaw resides in Intel Core and Xeon processors, and is similar to Spectre since ...
Malicious Code Can Look Like It Has Been Signed by Apple

Malicious Code Can Look Like It Has Been Signed by Apple

Security researchers just discovered a code-signing bypass vulnerability that allows malicious code to masquerade as an official Apply system file. In other words, some of the implementations of Apple’s official code-signing API ...
Three Vulnerabilities Found in Foscam IP Cameras (CVE-2018-6830)

Three Vulnerabilities Found in Foscam IP Cameras (CVE-2018-6830)

Three vulnerabilities have been found in Foscam security cameras. Owners of such cameras are urged to update as soon as possible. The flaws are described as an arbitrary file-deletion bug, a shell ...
The Value of Capture the Flag Competitions

The Value of Capture the Flag Competitions

If you’ve ever attended an infosec or hacker conference, you’re sure to have seen the Capture the Flag or CTF. As with anything in this industry, there are ebbs and flows in ...
Hackers Testifying at the United States Senate, May 19, 1998 (L0pht Heavy Industries)

The L0pht Legacy

20 Years Ago, Some Hackers Visited Congress… May 19th, 1998. I was just wrapping up my first year of college. My grades were terrible. Instead of going to classes, I had been ...
CVE-2018-8174 Vulnerability Used by Rig Exploit Kit

CVE-2018-8174 Vulnerability Used by Rig Exploit Kit

Security researchers have been following the activity surrounding the infamous Rig exploit kit. In these campaigns, attackers are compromising websites to inject a malicious script that redirects potential victims to the EK’s ...
Loading...