exploit

Apple fixes zero-day bug in Apple Vision Pro that ‘may have been exploited’

A day after reporters published their first hands-on review of Apple’s Vision Pro, the technology giant released its first security patch for the mixed reality headset to fix a vulnerability tha

A developer exploited an API flaw to provide free access to GPT-4

A developer is attempting to reverse-engineer APIs to grant anyone free access to popular AI models like OpenAI’s GPT-4 — legal ramifications be damned. The developer’s project, GPT4

Apple iCloud, Twitter and Minecraft vulnerable to ‘ubiquitous’ zero-day flaw

A number of popular services, including Apple iCloud, Twitter, Cloudflare, Minecraft and Steam, are reportedly vulnerable to a zero-day vulnerability affecting a popular Java logging library. The vuln

Homeland Security issues rare emergency alert over ‘critical’ Windows bug

Homeland Security’s cybersecurity advisory unit has issued a rare emergency alert to government departments after the recent disclosure of a “critical”-rated security vulnerability i

What security pros need to know from Black Hat & Def Con 2019

Black Hat and Def Con came and went as quickly as it ever does. The week-long pair of back-to-back conferences, referred to as “hacker summer camp,” draws in the security crowd from across

Homeland Security has tested a working BlueKeep remote code execution exploit

Homeland Security’s cyber agency says it has tested a working exploit for the BlueKeep vulnerability, capable of achieving remote code execution on a vulnerable device. To date, most of the priv

A backdoor in Optergy tech could remotely shut down a smart building ‘with one click’

Homeland Security has given the maximum severity score for a vulnerability in a popular smart building automation system. Optergy’s Proton allows building owners and managers to remotely monitor

A pair of new Bluetooth security flaws expose wireless access points to attack

Security researchers have found two severe vulnerabilities affecting several popular wireless access points, which — if exploited — could allow an attacker to compromise enterprise networks. The t

Password bypass flaw in Western Digital My Cloud drives puts data at risk

A security researcher has published details of a vulnerability in a popular cloud storage drive after the company failed to issue security patches for over a year. Remco Vermeulen found a privilege es

Here’s what you can do to protect yourself from the KRACK WiFi vulnerability

Security researcher Mathy Vanhoef publicly disclosed a serious vulnerability in the WPA2 encryption protocol today. Most devices and routers currently rely on WPA2 to encrypt your WiFi traffic, so ch

Copy and paste trick could unlock iOS 10 devices in Lost Mode

Lost and stolen iOS devices could be at risk if ne'er-do-wells learn of this blunt-force method of getting past Activation Lock. No special equipment or technical know-how is required, which means any

Confirmed: Snapchat Hack Not A Hoax, 4.6M Usernames And Numbers Published

A site called SnapchatDB.info has saved usernames and phone numbers for 4.6 million accounts and made the information available for download. SnapchatDB says that it got the information through a rece

An analysis of a PDF exploit

<img src="http://www.crunchgear.com/wp-content/uploads/2010/07/pdf-virus.jpeg" />Most people think of PDF documents as static pieces of information. How could a PDF file compromise your computer? The

Panic! A new Linux exploit in the wild

<img src="http://www.crunchgear.com/wp-content/uploads/2008/03/unixlinux.jpg" alt="unixlinux.jpg" title="unixlinux.jpg" />A new "exploit" has been revealed for Linux systems running kernel 2.6.30 and

iPhone Security Flaw Allows Full Data And Phone Access

Have iPhone, be careful. According to a new New York Times article, a computer security firm has discovered a flaw in the iPhone that allows someone to take complete control of the phone via a website