Security News
When users of hacking forums turn on each other, expect things to get messy quickly.
Researchers have uncovered some potentially serious SQLite vulnerabilities and they have demonstrated their findings by hacking an iPhone and a command and control (C&C) server used by malware. read more
Study Identifies 40 Certified Drivers From 20 Vendors That Open the Door to AttacksResearchers from the security firm Eclypsium have identified 40 poorly designed drivers from 20 hardware and BIOS...
Your 4G hotspot might seem very basic and low risk compared to your phone, but you need to keep it patched just as carefully!
Researcher show how they hacked Google Home smart speakers using the Megellan vulnerability.
TechRepublic's Karen Roby interviews Dan Patterson about the top trends at the Black Hat USA 2019 cybersecurity conference.
TechRepublic's Karen Roby interviews Dan Patterson about the top trends at the Black Hat USA 2019 cybersecurity conference.
Crooks don't have to break *into* your network to benefit - they can bounce *off* it so you take the blame and look like a hacker yourself.
$2 Billion From Cryptocurrency and Bank Heists Funneled to WeaponsA confidential, leaked UN report warns that North Korea has funneled an estimated $2 billion - stolen via online bank and...
The class action charges Capital One and GitHub, charging it with being "friendly" (at least) toward hacking and for the hackers' posts.