Vulnerabilities

Popular video doorbells can be easily hijacked, researchers find

Several internet-connected doorbell cameras have a security flaw that allows hackers to take over the camera by just holding down a button, among other issues, according to research by Consumer Report

Fertility tracker Glow fixes bug that exposed users’ personal data

A bug in the online forum for the fertility tracking app Glow exposed the personal data of around 25 million users, according to a security researcher. The bug exposed users’ first and last names, s

Here is Apple’s official ‘jailbroken’ iPhone for security researchers

In 2019, Apple announced it would start sending some security researchers a “special” version of the iPhone designed to be used to find vulnerabilities, which could then be reported to Apple so th

Security flaws in Honeywell devices could be used to disrupt critical industries

Security researchers have discovered numerous vulnerabilities in Honeywell devices used in critical industries that could, if exploited, allow hackers to cause physical disruption and potentially impa

GitLab’s new security feature uses AI to explain vulnerabilities to developers

Developer platform GitLab today announced a new AI-driven security feature that uses a large language model to explain potential vulnerabilities to developers, with plans to expand this to automatical

Hackers could remotely turn off lights, honk, mess with Tesla’s infotainment system

Thanks to three vulnerabilities chained together, malicious hackers could remotely hack into a Tesla, turn off the lights, honk the horn, open the trunk, activate the windshield wipers and mess with t

Gamers are fixing a video game ‘taken over’ by hackers

A popular first-person shooter game has significant vulnerabilities that allow malicious hackers to take over other players’ computers, as long as they are in the same online match. The situation is

Microsoft says attackers are hacking energy grids by exploiting decades-old software

Microsoft has warned that malicious hackers are exploiting a discontinued web server found in common Internet of Things (IoT) devices to target organizations in the energy sector. In an analysis publi

UK government is scanning British internet space for zero-day threats

The U.K.’s National Cyber Security Centre has launched a new program that will continually scan every internet-connected device hosted in the United Kingdom for vulnerabilities to help the governmen

Notes From Crazytown, Day Three: Black Hat Breakdown

So far this week, at Black Hat, I have learned to deeply mistrust: passwords, chip-and-PIN cards, USB devices, HTTPS connections, more than two billion phones, governments worldwide, all human societi

iPhone Vulnerabilities: The Password is "Dottie"

Hackers and security researchers have already found a nice collection of vulnerabilities in the iPhone, including an overflow issue in Safari that could allow unsigned code to infect the phone. The be

Apple WiFi Vulnerability was Fictitious

I’m sure you remember all that fuss about those holes in the Apple WiFi drivers. Well as reality would have it, those claims were erroneous. TUAW reports that SecureWorks, the company sponsoring