Users of new CPU architectures will not receive Windows 7 and 8.1 updates anymore, according to a Microsoft support topic published last week.
A woman traveling on a flight from Beijing, China to Melbourne, Australia suffered burns on her face and hands after her battery-powered headphones exploded.
In a research paper published at the end of February, a team of five scientists from the Graz University of Technology has described a novel method of leaking data from SGX enclaves, a secure environment created by Intel CPUs for storing sensitive information for each process, such as encryption keys, passwords, and other.
The USG is an USB attachment that allows users to connect USB flash drives and other USB devices to their computer without any of the risks.
For many years, MAC Address Randomization was slated as the next big thing for protecting user privacy on the modern Internet.
What started as an analysis of a simple security flaw in a random wireless IP camera turned into seven vulnerabilities that affect over 1,250 camera models and expose nearly 200,000 cameras to hacking.
Believe it or not, there are DVRs and IP cameras available online today that you could hack just like in the movies, in a matter of seconds.
Multiple Western Digital MyCloud Networked Attached Storage (NAS) devices are affected by several security flaws, varying in severity, that allow attackers to bypass authentication, execute code on the device, and upload or download user data.
Security researchers have discovered a hidden backdoor in the firmware of DblTek GoIP GSM gateways that allows Telnet access to affected devices.
Custom-made malware installed on an offline computer can use a hard drive's LED to send out sensitive data from infected computers to nearby cameras.
Have you ever noticed that all Windows built-in drivers have the same value in the last update field? Have you wondered why? If you read Windows update logs, it's pretty obvious that Microsoft updates its drivers, so why isn't that date changing?
A grey-hat hacker going by the name of Stackoverflowin says he's pwned over 150,000 printers that have been left accessible online.
Knowing that printers are everywhere and they can leak sensitive information, these devices are precious reconnaissance and pivot points for any hacker trying to breach sensitive enterprise networks.
Netgear has issued patches that resolve a simple bug in the firmware of 20 different router models that allow an attacker to expose the router's web panel admin password, which they can use to take over the device.
Attackers with access to a device can take control over a target's computer and bypass all local security systems by abusing a hardware debugging interface included with Intel CPUs, which in recent years has become accessible via an external USB 3.0 port.
A team of researchers from universities in Singapore and Germany have found a way to turn the latest models of RAM memory chips into data processing units and effectively eliminate the need for a CPU.
The security protocol that governs how virtual machines share data on a host system powered by AMD Zen processors has been found to be insecure, at least in theory, by Felicitas Hetzelt and Robert Buhren, two scientists at the Security in Telecommunications Department at the Technical University of Berlin, Germany.
A new battery technology developed in the US will take seconds to charge, last over a week, and survive 30,000 recharge cycles, 20 times more than regular Lithium-ion batteries deployed today.