One vulnerability, which could make it possible for attackers or malware to escalate their privileges to complete control of the machine, takes advantage of use of an insecure API. (Image Courtesy of Zoom) Zoom vulnerabilities couldĀ give attackers webcam, microphone access Fret not: Attackers would need physical access to your computer to exploit the flaws. Apr 1, 2020 By Shannon Vavra
Trend Micro’s David Sancho on criminals’ favorite IoT targets It's not about ttacking smart toasters or Barbie dolls. Mar 18, 2020 By Jeff Stone