Security News

A team of researchers has introduced the concept of smart greybox fuzzing, which they claim is much more efficient in finding vulnerabilities in libraries that parse complex files compared to...

Researchers with software risk measurement and management company Checkmarx were able to create two mobile applications that abuse the functionality of smart bulbs for data exfiltration. read more

Who is tessa88? Security Researchers Believe They Know Hacker's True Identity Recorded Future security researchers believe they were able to correctly identify the individual who in 2016 leaked...

John Toterhi, a security researcher with IoT security company Finite State, believes that many of the security problems plaguing IoT devices are solvable problems through transparency....

A team of researchers has described seven new variants of the notorious Meltdown and Spectre attacks, and they claim some of these methods are not mitigated by existing patches, but Intel...

Experiments showed that processors from AMD, ARM, and Intel are affected.

Organized in collaboration with Maximiliano Soler from ToolsWatch and Matteo Beccaro from Opposing Force, the HITB Armory is a brand new area of HITB2018DXB where independent researchers will get...

Systemic analysis reveals a range of new issues, and a need for new mitigations.

A security researcher from Tenable, Inc. recently discovered that it is possible to bypass Windows’ User Account Control (UAC) by spoofing the execution path of a file in a trusted directory. read more

A security researcher has published a zero-day flaw in a commonly-used virtual machine management system without notifying the vendor, justifying it with a scathing critique of the infosecurity industry.