The vulnerabilities affect eight router models, the company said.
A video will start playing, but something strange could be happening as well.
The worst one could allow a remote attacker to change DNS settings
A setup mistake could put the routers at risk of being compromised, and there's no easy way for consumers to identify or fix the problem.
The advertisements redirected victims to the Sweet Orange exploit kit, which tries to install malware.
Instagram and Grindr stored images on their servers that were accessible without authentication
Mobile applications often don't warn users before a call is made, which a developer says could be abused
Joshua Rogers decided to go public with the information after notifying PayPal of the problem on June 5
Two researchers will show at Defcon how a Dropcam could turn into a Trojan horse
Signal is compatible with RedPhone, its Android sibling, and scrambles voice calls placed via the iPhone.
Instagram is moving to full https encryption but isn't there just yet
The use of such tracking tools may be unknown to most users, according to a research paper
A Raspberry-Pi powered tool tricks Google Chromecast into playing Rick Astley
The law paves the way for legal use of community currencies, bitcoin and other U.S. dollar alternatives
Articles by Jeremy KirkNext Page