Tag Archives: devices

Qualcomm acquires Arduino

[German]The Arduino electronics platform is to be acquired by processor manufacturer Qualcomm for an undisclosed sum, with the brand name remaining unchanged. At the same time, new boards have been announced.

Posted in devices | Tagged , | Leave a comment

MSI RTX 5090 graphics card: 12V 2×6 cable continues to melt

Modern graphics cards are power guzzlers and there is a risk that the plugs of connection cables will burn. For its RTX 5090 graphics card, manufacturer MSI supplies a 12V 2×6 cable with yellow-colored plugs for the power supply. However, … Continue reading

Posted in devices | Tagged | Leave a comment

Critical AMI-BMC vulnerability CVE-2024-54085 allows server takeover

[German]Brief warning or information for administrators who use AMI MegaRAC BMC. The company has already published a security warning on March 11, 2025. There is a critical vulnerability CVE-2024-54085 (CVSS v4 score of 10.0), which should allow a remote server … Continue reading

Posted in devices, Security, Software | Tagged , , | Leave a comment

Home automation: G-HOMA discontinues app support, wall sockets/cameras useless?

[German]Do you use wall sockets or cameras from G-HOMA? I don't know if it affects any other readers, but the provider G-HOMA seems to shutting down and discontinuing support for its app for smart sockets, which will become useless as … Continue reading

Posted in devices | Tagged , | 2 Comments

Bitdefender finds vulnerabilities in Bosch BCC100 thermostats

[German]Security provider Bitdefender has informed me that security researchers in its labs have found vulnerabilities in Bosch BCC100 thermostats. Hackers can use these vulnerabilities to take control of such smart thermostats and gain access to smart home networks. The experts … Continue reading

Posted in devices, Security | Tagged , | Leave a comment

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


LogoFAIL: Critical vulnerabilities in the UEFI code

[German]There are several critical vulnerabilities in the UEFI code of the firmware of various BIOS/UEFI implementations that could be used to inject malware into a system. The whole thing was already announced by the Binarly REsearch Team on November 29, … Continue reading

Posted in devices, Security, Software | Tagged , , | 2 Comments

Cisco: New 0-day vulnerability (CVE-2023-20273) in IOS XE; already being exploited

[German]US vendor Cisco has publicly disclosed another 0-day vulnerability (CVE-2023-20273) in IOS XE as of October 20, 2023. This vulnerability is already being exploited in the wild to compromise systems. The vendor plans to provide fixes for the CVE-2023-20198 and … Continue reading

Posted in devices, Security, Software | Tagged , , | Leave a comment

TP-LINK TL-WR840N: Vulnerability allows stack buffer overflow DOS

There is a vulnerability in the firmware of the TP-Link router TP-LINK TL-WR840N that allows a remote attacker to perform a stack buffer overflow DOS attack. TP-Link does not want to publish a security advisory for this, but has made … Continue reading

Posted in devices, Security | Tagged , | Leave a comment

Nexx garage door remote controller: Vulnerability allows access for hackers

[German]Anyone who owns a Nexx home automation system and uses it to remotely control their garage doors now has a fat problem. A vulnerability in the Nexx remote control allows hackers to gain unauthorized access to the garage doors. They … Continue reading

Posted in devices, Security, Software | Tagged , | Leave a comment

Security: DJI drones and it's AeroScope vulnerabilities

[German]Drones from the Chinese manufacturer DJI have vulnerabilities that allow third parties to read radio traffic and determine the location of the drone pilot. This vulnerability comes from a monitoring feature called AeroScope (DroneID), developed by the manufacturer for "law … Continue reading

Posted in devices, Security | Tagged , | Leave a comment