Blogs
Links
Social networks
Awards
Sponsors
(Paypal-Donations)Recent Comments
Recent Comments
Tag Archives: devices
Bitdefender finds vulnerabilities in Bosch BCC100 thermostats
[German]Security provider Bitdefender has informed me that security researchers in its labs have found vulnerabilities in Bosch BCC100 thermostats. Hackers can use these vulnerabilities to take control of such smart thermostats and gain access to smart home networks. The experts … Continue reading
Advertising
LogoFAIL: Critical vulnerabilities in the UEFI code
[German]There are several critical vulnerabilities in the UEFI code of the firmware of various BIOS/UEFI implementations that could be used to inject malware into a system. The whole thing was already announced by the Binarly REsearch Team on November 29, … Continue reading
Cisco: New 0-day vulnerability (CVE-2023-20273) in IOS XE; already being exploited
[German]US vendor Cisco has publicly disclosed another 0-day vulnerability (CVE-2023-20273) in IOS XE as of October 20, 2023. This vulnerability is already being exploited in the wild to compromise systems. The vendor plans to provide fixes for the CVE-2023-20198 and … Continue reading
TP-LINK TL-WR840N: Vulnerability allows stack buffer overflow DOS
There is a vulnerability in the firmware of the TP-Link router TP-LINK TL-WR840N that allows a remote attacker to perform a stack buffer overflow DOS attack. TP-Link does not want to publish a security advisory for this, but has made … Continue reading
Nexx garage door remote controller: Vulnerability allows access for hackers
[German]Anyone who owns a Nexx home automation system and uses it to remotely control their garage doors now has a fat problem. A vulnerability in the Nexx remote control allows hackers to gain unauthorized access to the garage doors. They … Continue reading
Advertising
Why ISL Online: Critical factors when choosing a remote desktop solution
[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...
Security: DJI drones and it's AeroScope vulnerabilities
[German]Drones from the Chinese manufacturer DJI have vulnerabilities that allow third parties to read radio traffic and determine the location of the drone pilot. This vulnerability comes from a monitoring feature called AeroScope (DroneID), developed by the manufacturer for "law … Continue reading
Advertising
D-Link: End of support for mydlink Home and mydlink Baby Monitor Apps and Cloud Services (Dec. 30, 2022)
[German]Are you using D-Link products like the mydlink Baby Monitor or mydlink Home. Today, December 30, 2022, vendor D-Link will shut down certain cloud services. The aforementioned devices will then become electronic junk because their functionality will be lost. An … Continue reading
Anker's Eufy deletes privacy pledges – time to disable cameras?
[German]The Anker subsidiary Eufy seems to have removed statements regarding data privacy and the use of surveillance camera data from its documentation and corporate website. This was reported by The Verge, which had asked the provider about the matter. The … Continue reading
Advertising
USB-C port for mobile devices mandatory from December 28, 2024 in European Union
[German]The countdown from when the USB-C port becomes mandatory in European Union for mobile devices as a charging port has begun. The EU has set December 28, 2024 as the start date from which this obligation will apply. This implements … Continue reading
Anchor Eufy Door Bell security cameras with vulnerabilities, data transferred to the cloud, Homebase 2 also has vulnerabilities
[German]Anker Eufy Door Bell security cameras are also sold in Germany. A security researcher has now found several security vulnerabilities in the firmware of the Eufy cameras. These transfer user images and facial recognition data to the cloud without the … Continue reading