Category Archives: News

blog-3

Car alarm vulnerabilities allow hijack hack

13/03/2019 / by

Pen Test Partners found vulnerabilities in aftermarket car alarms which allowed them to hack and hijack cars in a matter of moments. Pen Test Partners tested two alarms, one...

Read more
blog-3

Data-tracking Chrome flaw triggered by viewing PDFs

09/03/2019 / by

Researchers have spotted an unusual ‘trackware’ attack triggered by viewing a PDF inside the Chrome browser. Security company EdgeSpot said it noticed suspicious PDFs, which seem to have been circulating since...

Read more
blog-3

Chinese facial recognition database exposes 2.5m people

16/02/2019 / by

A company operating a facial recognition system in China has exposed millions of residents’ personal information online. Shenzen-based SenseNets is an artificial intelligence company that uses a network of...

Read more
blog-3

Linux user? Check those patches! Public exploit published for systemd security holes…

01/02/2019 / by

A pair of recent bugs in a very widely used Linux system tool called systemd have just been “weaponised” by a US cybersecurity company called Capsule8. The systemd project is a large, complex...

Read more
blog-3

Matrix under the microscope: what a niche ransomware can teach us

01/02/2019 / by

In the world of computer security, a great deal of time and column inches are devoted to the extremes. At the extreme of simplicity, we have the immortal mystery...

Read more
blog-3

Change your password! VoIP provider leaves huge database exposed online

18/01/2019 / by

A researcher has discovered an exposed database containing gigabytes of call logs, SMS data, and internal system credentials belonging to US Voice-over-IP (VoIP) service provider VOIPo.com. It’s become a familiar story...

Read more
blog-3

Don’t fall victim to the Chromecast hackers – here’s what to do

05/01/2019 / by

If you ever used dial-up networking to access the internet, you probably remember it mostly for being cumbersome and slow. But it was also astonishingly insecure, because your computer...

Read more
blog-3

Security company claims it can access data from locked iPhones with 100% success rate

16/12/2018 / by

Despite Apple’s best efforts, it appears that security researchers are still coming up with ways to access data on an otherwise locked iOS device. Most recently, a data recovery...

Read more
blog-3

Does wiping your iPhone count as destroying evidence?

19/11/2018 / by

Police are accusing a 24-year-old woman, arrested in connection with a drive-by shooting, of remote-wiping her iPhone and thereby destroying evidence – a felony offense. Her defense: I don’t...

Read more
blog-3

How one man could have taken over any business on Facebook

06/11/2018 / by

The flaws in Facebook’s social network just keep coming. The latest one, luckily discovered and reported by a white hat researcher, enabled anyone on Facebook to make themselves (or...

Read more