Security News
Remember that Chrome update that stopped websites from detecting Incognito mode? Well, researchers claim to have found a way around it.
Spurred by several past instances of attackers abusing device drivers to install a kernel rootkit or malicious firmware implants, Eclypsium researchers have decided to probe the security of a wide...
Researchers at cybersecurity firm Check Point have demonstrated that malicious actors could hack a DSLR camera and infect it with a piece of ransomware. read more
It formalizes the reality: "pre-jailbroken" iPhones were already on the black market.
Researcher show how they hacked Google Home smart speakers using the Megellan vulnerability.
Repurposing Mac malware is not a difficult task for someone with reverse-engineering skills, and it’s a far simpler approach compared to writing malware from scratch, a researcher has...
Three years ago at the Black Hat conference, Apple announced its first bug bounty program, which was invite-only and limited to iOS. At this year’s edition of the con, Ivan Krstić, Apple’s head of...
Researchers from security firm IOActive have discovered a series of vulnerabilities and attacks that they believe could be possible on Boeing's 787 Dreamliner. read more
Researchers were able to bypass Apple's FaceID using a pair of glasses with tape on the lenses.
You might not think your phone is as exposed as an internet server - but it's handling plenty of untrusted data from unknown sources!