By exploiting the vulnerabilities, a hacker could have unauthenticated full access to the TVs and steal personal information while TCL could remotely access the TV sets.
The Trump campaign's website in Maricopa county, Arizona was set up for self-reporting voter fraud but it had SQL injection vulnerability, exposing voters' personal information
The UK registrar of companies withheld the original name of the business from filing papers after the founder realized that the name could be exploited to hack other websites.
Google's Project Zero bug-hunting team discovered the vulnerability recently and said that it was being exploited by hackers actively but Microsoft hasn't released a fix yet.
DHS, ICE and CBP use the purchased data to track immigrants but privacy experts believe that it can be used for broader domestic surveillance of Americans
Google One's 2TB cloud-storage subscription plan now gives you free VPN service at no additional cost, making it a compelling choice over other providers.
After the NSA published a list of 25 common vulnerabilities, cybersecurity research firm Check Point found that Chinese hackers have been exploiting them to expand globally
Following the Novichok poisonings in 2018, the U.K. launched cyberattacks on Russian interests in retaliation as per the former cabinet secretary Mark Philip Sedwill
The Triton malware was allegedly developed by Russia's Research Institute of Chemistry and Mechanics for a cyberattack on a Saudi oil refinery and U.S. utility companies
A day after it was revealed that hackers from Russia and Iran obtained U.S. voter information, CISA and FBI in a joint statement said that a state-backed Russian group stole data