Skip to content

Bryan's Blog

  • Home
  • Useful Links
  • Contact

Tag: vulnerability

Microsoft researchers find NSA-style backdoor in Huawei laptops

https://www.scmagazine.com/home/security-news/vulnerabilities/microsoft-defender-advanced-threat-protection-atp-service-featured-in-windows-version-1809-discovered-an-nsa-inspired-backdoor-vulnerability-in-huawei-laptops/

Bryan Phelps Link 2019-04-022019-04-01 1 Minute

Researchers discover and abuse new undocumented feature in Intel chipsets

https://www.zdnet.com/article/researchers-discover-and-abuse-new-undocumented-feature-in-intel-chipsets/

Bryan Phelps Link 2019-03-292019-03-29 1 Minute

36 Undiscovered Flaws in 4G LTE Revealed by a New Security Tool

https://gizmodo.com/36-undiscovered-flaws-in-4g-lte-revealed-by-a-new-secur-1833649126

Bryan Phelps Link 2019-03-292019-03-29 1 Minute

Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers

https://motherboard.vice.com/en_us/article/pan9wn/hackers-hijacked-asus-software-updates-to-install-backdoors-on-thousands-of-computers

Bryan Phelps Link 2019-03-272019-03-25 1 Minute

Smart alarms left 3 million cars vulnerable to hackers who could turn off motors

https://www.cnet.com/news/smart-alarms-left-3m-cars-vulnerable-to-hackers-who-could-turn-off-motors/

Bryan Phelps Link 2019-03-112019-03-11 1 Minute

Warning over ‘high severity’ security flaw in Google’s Chrome web browser being exploited in the wild

https://www.computing.co.uk/ctg/news/3072132/warning-over-high-severity-security-flaw-in-googles-chrome-web-browser-being-exploited-in-the-wild

Bryan Phelps Link 2019-03-072019-03-06 1 Minute

Hijacking WhatsApp without Hacking

https://keyfindings.blog/2019/02/27/hijacking-whatsapp-without-hacking/ https://keyfindings.blog/2019/02/27/hijacking-whatsapp-without-hacking/

Bryan Phelps Link 2019-03-052019-03-05 1 Minute

Serious Amazon Ring vulnerability leaves audio and video feeds open to interception and spoofing

https://betanews.com/2019/02/27/ring-vulnerability-video-spoofing/ https://betanews.com/2019/02/27/ring-vulnerability-video-spoofing/

Bryan Phelps Link 2019-03-012019-02-28 1 Minute

New flaws in 4G, 5G allow attackers to intercept calls and track phone locations

https://techcrunch.com/2019/02/24/new-4g-5g-security-flaws/ https://techcrunch.com/2019/02/24/new-4g-5g-security-flaws/

Bryan Phelps Link 2019-02-262019-02-26 1 Minute

Researchers warn of serious password manager flaws

https://www.bit-tech.net/news/tech/software/researchers-warn-of-serious-password-manager-flaws/1/

Bryan Phelps Link 2019-02-202019-02-20 1 Minute

Privacy Protection Bypass Flaw in macOS Gives Access to Browsing History

https://www.bleepingcomputer.com/news/security/privacy-protection-bypass-flaw-in-macos-gives-access-to-browsing-history/

Bryan Phelps Link 2019-02-122019-02-12 1 Minute

Thousands of industrial refrigerators can be remotely defrosted, thanks to default passwords

https://techcrunch.com/2019/02/08/industrial-refrigerators-defrost-flaw/ https://techcrunch.com/2019/02/08/industrial-refrigerators-defrost-flaw/

Bryan Phelps Link 2019-02-092019-02-08 1 Minute

Posts navigation

Newer posts

Categories

Tags

Amazon Android Apple Artificial Intelligence breach California China EFF encryption European Union Facebook facial recognition Google howto iPhone location tracking Microsoft news privacy security Surveillance tracking United Kingdom USA vulnerability
  • RSS - Posts
  • Contact
Create a website or blog at WordPress.com
  • Subscribe Subscribed
    • Bryan's Blog
    • Join 269 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Bryan's Blog
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
Design a site like this with WordPress.com
Get started