Blog

P2P weakpoint leaves millions of IoT devices exposed

by iZOOlogicMarch 19, 2020

Security experts discovered two serious vulnerabilities in the iLnkP2P P2P...

Two Crypto-Stealing apps on Google Play Store abused by hackers

by iZOOlogicMarch 17, 2020

Cyber-security researchers have just discovered two (2) malicious crypto-stealing apps...

Weakpoints in Sierra Wireless AirLink ES450 discovered

by iZOOlogicMarch 13, 2020

Cyber Security Researchers at CTG disclosed a dozen vulnerabilities affecting...

Is your machine good for cryptomining or ransomware: This virus can decide

by iZOOlogicMarch 12, 2020

Ransomware and Cryptocurrency mining attacks have been very frequent since...

Critical malware allows RCE to Cisco Industrial Network Director

by iZOOlogicMarch 11, 2020

A high-severity malware has been found to Cisco’s enterprise-class Industrial...

Latest Qualcomm chipset vulnerability flaw allows entry for hackers

by iZOOlogicMarch 10, 2020

Qualcomm chipsets are generally the processor of choice for many...