Cybersecurity researchers have discovered a fresh set of security issues in the Terrestrial Trunked Radio (TETRA) communications protocol, including in its proprietary end-to-end encryption (E2EE) mechanism that exposes the system to replay and brute-force attacks, and even decrypt encrypted traffic.…
Category: EN
Amazon EC2 defenses against L1TF Reloaded
The guest data of AWS customers running on the AWS Nitro System and Nitro Hypervisor is not at risk from a new attack dubbed “L1TF Reloaded.” No additional action is required by AWS customers; however, AWS continues to recommend that…
The best tablets for students in 2025: Expert recommended for back-to-school season
Our experts went hands-on with the best tablets for students from top brands like Apple, Samsung, and Wacom, just in time for back-to-school season. This article has been indexed from Latest news Read the original article: The best tablets for…
Tiny gold “super atoms” could spark a quantum revolution
Scientists have found that microscopic gold clusters can act like the world’s most accurate quantum systems, while being far easier to scale up. With tunable spin properties and mass production potential, they could transform quantum computing and sensing. This article…
NZTA Breach Results in Vehicle Theft, User Data Compromise
Data compromise leads to targeted motor theft A privacy breach has leaked the details of 1000 people (estimate) in a Transport firm’s database over the past year. According to the agency, the breach targeted 13 vehicles for theft. The problem…
40,000 WordPress Sites Affected by Arbitrary File Read Vulnerability in UiCore Elements WordPress Plugin
On June 13th, 2025, we received a submission for an Arbitrary File Read vulnerability in UiCore Elements, a WordPress plugin with more than 40,000 active installations. This vulnerability makes it possible for an unauthenticated attacker to read arbitrary files on…
Erlang/OTP SSH RCE Vulnerability Actively Exploited to Target OT Networks
A severe vulnerability, designated CVE-2025-32433 with a CVSS score of 10.0, has been identified in the Secure Shell (SSH) daemon of the Erlang programming language’s Open Telecom Platform (OTP). This flaw permits unauthenticated remote code execution (RCE) by allowing attackers…
3 charging mistakes that are killing your tablet – and the simple fix you need
Your tablet’s reliability depends on its battery – so treat it with the care it needs. This article has been indexed from Latest news Read the original article: 3 charging mistakes that are killing your tablet – and the simple…
Save $150 on the OnePlus 13 right now and get a free gift – but hurry
The OnePlus 13 is an arguably better alternative to Samsung’s Galaxy S25 Ultra, and it’s on sale up until Labor Day. This article has been indexed from Latest news Read the original article: Save $150 on the OnePlus 13 right…
How ShinyHunters Hacking Group Stole Customer Data from Salesforce
Hackers posed as Salesforce IT staff, using vishing to trick employees into installing malicious software for data theft and extortion. This article has been indexed from Security | TechRepublic Read the original article: How ShinyHunters Hacking Group Stole Customer Data…