We turned a coffee maker into a dangerous machine asking for ransom by modifying the maker’s firmware. While we could, could someone else do it too?
I tested the level of account security of 10 different IP security cameras I found on Amazon’s “hot new releases” and “best sellers” categories Introduction When the COVID-19 pandemic spread across Europe, I, like many others, was forced to work from home. While at home, I tried to find...
For some time now, we’ve been monitoring a new strain of malicious programs that we are referring to as "Meh". It all started when we came across large amounts of files with randomly generated strings at their beginning, followed by a compiled AutoIt script… and what a ride it has been since.