Security researchers have found malware hidden in the firmware of several low-end Android smartphones and tablets, malware which is used to show ads and install unwanted apps on the devices of unsuspecting users.
Sony has released firmware updates that remove a remotely exploitable backdoor account from 80 models of IP and security cameras.
Websites offering free keygens for various enterprise software applications are helping crooks spread the Gatak malware, which opens backdoors on infected computers and facilitates attacks on a company's internal network, or the theft of sensitive information.
The case of the Netis router firmware backdoor shows you that even if a company puts out a patch to resolve security issues, the problem lingers on for years, as users fail to update their devices, or the patch itself fails to properly fix the issue.
Security researchers have discovered that third-party firmware included with over 2.8 million low-end Android smartphones allows attackers to compromise Over-the-Air (OTA) update operations and execute commands on the target's phone with root privileges.
Hardware hacker Samy Kamkar has released a new tool called PoisonTap that is capable of a plethora of malicious actions, all of which work even against password-protected computers on which an attacker can't access the desktop.
Security researchers have found a secret backdoor in the firmware of many Android smartphones sold in the US, which covertly gathers information on phone owners and sends it to a server in China.
Researchers have come across a new malware variant, currently in development, that likes to bombard victims with countless of popup ads, and kill their CPU by opening countless processes.
A new tech support scam Trojan is actively being distributed that allows the malware developers to remotely execute commands on an infected computer.
A new World of Warcraft scam is being used that uses social engineering to try and trick victims into entering a special command. When a victim enters this command it would allow attackers to take control of victim's in-game WOW interface, make unauthorized trades, and find the victim's location anywhere in the game.