When talking about the Internet of Things - "things" with an embedded computing system able to interoperate within the Internet infrastructure - we usually think about fridges, thermostats, smart cars, garage doors, cameras, and various implants.
A group of Austrian and French researchers have devised a relatively simple way to remotely exploit the Rowhammer bug present in some computer chips.
The comment period for the proposed amendments to the Wassenaar Arrangement regarding "cybersecurity items" has ended, and the overwhelming majority of the 150+ comments submitted are negative.
Another zero-day vulnerability is being exploited in attacks spotted in the wild: this time, the targeted software is Java.
Exploits for two more Adobe Flash 0-days have been found in the leaked Hacking Team data.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.