Security News

Neuralink Pursues a Brain-Computer Interface; What Could Go Wrong?The news that serial entrepreneur Elon Musk and scientists have unveiled Neuralink - a neuroscience startup that's been in stealth...

Check Point Researchers Say Flaw Allows Execution of Malicious CodeSecurity researchers at Check Point Software Technologies say they've uncovered an SQLite database vulnerability in Apple iOS...

Session shows how researchers found multiple vulnerability in Canon firmware that can be used in a malware attack.

Researchers exploit a SQLite memory corruption issue outside of a browser.

LAS VEGAS – A vulnerability in a popular IoT lock key – used chiefly by a high-end hotel in Europe – allowed researchers to break into hotel rooms. The locks in question are dubbed “mobile keys”...

Exploit an 3l33t zero-day and reverse-shell that backend DB proxy server... or simply pay this farmer off Black Hat Black Hat founder Jeff Moss opened this year's shindig in Las Vegas with tales...

Maybe, maybe not. These hack-in-a-box widgets are something to think about at least, says Big Blue Black Hat IBM's X-Force hacking team have come up with an interesting variation on wardriving –...

I know there's a lot of politics associated with this story, but concentrate on the cybersecurity aspect for a moment. The cell phones of a thousand Brazilians, including senior government...

The Air Force paid out $123,000 to researchers who found vulnerabilities in the organization's move to the cloud. Here's why.

Equifax 2017. Marriott 2018. Capital One 2019. read more