A year-long study revealed on Friday that laptop manufacturers seriously overstate their claims on a device's battery life, sometimes by hours, not minutes.
Work on DDR5 (Double Data Rate 5), a standard for computer memory chips, has already begun, JEDEC, a standards body for the microelectronics industry, said on Thursday.
Yesterday, at the BlackHat Asia 2017 security conference, researchers from cyber-security firm Cylance disclosed two vulnerabilities in the firmware of Gigabyte BRIX small computing devices, which allow an attacker to write malicious content to the UEFI firmware.
A new tool released on GitHub last week can help paranoid sysadmins keep track of whenever someone plugs in or disconnects an USB-based device from high-value workstations.
A new attack on smart TVs allows a malicious actor to take over devices using rogue DVB-T (Digital Video Broadcasting — Terrestrial) signals, get root access on the smart TV, and use the device for all sorts of nasty actions, ranging from DDoS attacks to spying on end users.
A new technique named DoubleAgent, discovered by security researchers from Cybellum, allows an attacker to hijack security products and make them take malicious actions.
Over 300 Cisco products are affected by a zero-day vulnerability Cisco discovered last week, and for which no patch is available at the time of writing.
Some Ubiquiti network device models can be hacked thanks to an unpatched vulnerability, allowing attackers to gain control over the device, or use it as a pivot point in the victim's network to hack other nearby equipment.
Users of new CPU architectures will not receive Windows 7 and 8.1 updates anymore, according to a Microsoft support topic published last week.
A woman traveling on a flight from Beijing, China to Melbourne, Australia suffered burns on her face and hands after her battery-powered headphones exploded.
Scientists from two US universities have found a way to attack accelerometers by using sound waves, a technique that has allowed them to spoof accelerometer signals and feed devices and applications with fake data.
In a research paper published at the end of February, a team of five scientists from the Graz University of Technology has described a novel method of leaking data from SGX enclaves, a secure environment created by Intel CPUs for storing sensitive information for each process, such as encryption keys, passwords, and other.
Lab tests carried out by Dutch scientists have shown that some of today's "smart" electrical meters may give out false readings that in some cases can be 582% higher than actual energy consumption.
The USG is an USB attachment that allows users to connect USB flash drives and other USB devices to their computer without any of the risks.
For many years, MAC Address Randomization was slated as the next big thing for protecting user privacy on the modern Internet.
What started as an analysis of a simple security flaw in a random wireless IP camera turned into seven vulnerabilities that affect over 1,250 camera models and expose nearly 200,000 cameras to hacking.
Believe it or not, there are DVRs and IP cameras available online today that you could hack just like in the movies, in a matter of seconds.
The CIA has developed a hacking tool named Weeping Angel that can turn Samsung smart TVs into covert listening devices.
Multiple Western Digital MyCloud Networked Attached Storage (NAS) devices are affected by several security flaws, varying in severity, that allow attackers to bypass authentication, execute code on the device, and upload or download user data.
Scientists from the Data Science Institute at Columbia University and the New York Genome Center (NYGC) published new research this week detailing a new data storage technique that leverages DNA molecules to store digital information.