The device uses the 900MHz band, but hides the data in the background radio noise.
Researchers found a way to write malicious firmware to a popular LTE/3G modem module built into business laptops and tablets
The technique could enable attackers to attack Windows servers hosted in the cloud
The Intel vulnerability was introduced in 1997, but has remained hidden until now.
Researchers discovered weaknesses in the remote support tools pre-installed on Android devices by manufacturers and carriers
There's no easy fix, a security researcher said at the Black Hat security conference
Researchers highlight the potential use of file synchronization services for stealthy and persistent remote control
The hacker exploited a vulnerability in an outdated software component to extract information from a single server
Attackers controlling entry nodes on the Tor network could find the location of hidden services or unmask users visiting them
The flaw could be exploited remotely to crash DNS servers by sending them a single packet
Flight manifests including passenger information and destinations were stolen, report claims
Researchers discovered a vulnerability in Android's mediaserver component that can be exploited by malicious apps and websites.
The forum's last administrator has plans to restore the site, with better protections against law enforcement investigations
The flaw affects virtualization systems that use QEMU to emulate CD-ROM drives
Vulnerabilities in the Android multimedia framework allow attackers to remotely compromise devices with ease, a researcher said.