Black Hat and Def Con came and went as quickly as it ever does. The week-long pair of back-to-back conferences, referred to as “hacker summer camp,” draws in the security crowd from across
Most people don’t think twice about picking up a phone charging cable and plugging it in. But one hacker’s project wants to change that and raise awareness of the dangers of potentially ma
If you can’t trust your bank, government or your medical provider to protect your data, what makes you think students are any safer? Turns out, according to one student security researcher, they
How safe are your secrets? If you used Amazon’s Elastic Block Storage snapshots, you might want to check your settings. New research just presented at the Def Con security conference reveals how
Robocall-blocking apps promise to rid your life of spoofed and spam phone calls. But are they as trustworthy as they claim to be? One security researcher said many of these apps can violate your priva
Apple is finally giving security researchers something they’ve wanted for years: a macOS bug bounty. The technology giant said Thursday it will roll out the bug bounty program to include Macs an
You probably don’t think too much about your humble office printer. But they’re a prime target for hackers, if any of the dozens of vulnerabilities found by security researchers are anythi
More than 1.5 million users of a group dating service had their personal data exposed — including their real-time location — because of a vulnerability in the app. The dating site, 3Fun, bills its
Why break into a company’s network when you can just walk right in — literally? Gone could be the days of having to find a zero-day vulnerability in a target’s website, or having to scra
Researchers have found several security flaws in popular corporate VPNs which they say can be used to silently break into company networks and steal business secrets. Devcore researchers Orange Tsai a