Def Con 2019

What security pros need to know from Black Hat & Def Con 2019

Black Hat and Def Con came and went as quickly as it ever does. The week-long pair of back-to-back conferences, referred to as “hacker summer camp,” draws in the security crowd from across

This hacker’s iPhone charging cable can hijack your computer

Most people don’t think twice about picking up a phone charging cable and plugging it in. But one hacker’s project wants to change that and raise awareness of the dangers of potentially ma

How safe are school records? Not very, says student security researcher

If you can’t trust your bank, government or your medical provider to protect your data, what makes you think students are any safer? Turns out, according to one student security researcher, they

Hundreds of exposed Amazon cloud backups found leaking sensitive data

How safe are your secrets? If you used Amazon’s Elastic Block Storage snapshots, you might want to check your settings. New research just presented at the Def Con security conference reveals how

Robocall blocking apps caught sending your private data without permission

Robocall-blocking apps promise to rid your life of spoofed and spam phone calls. But are they as trustworthy as they claim to be? One security researcher said many of these apps can violate your priva

Apple expands its bug bounty, increases maximum payout to $1M

Apple is finally giving security researchers something they’ve wanted for years: a macOS bug bounty. The technology giant said Thursday it will roll out the bug bounty program to include Macs an

Flawed office printers are a silent but serious target for hackers

You probably don’t think too much about your humble office printer. But they’re a prime target for hackers, if any of the dozens of vulnerabilities found by security researchers are anythi

Group dating app 3Fun exposed sensitive data on 1.5 million users

More than 1.5 million users of a group dating service had their personal data exposed — including their real-time location — because of a vulnerability in the app. The dating site, 3Fun, bills its

With warshipping, hackers ship their exploits directly to their target’s mail room

Why break into a company’s network when you can just walk right in — literally? Gone could be the days of having to find a zero-day vulnerability in a target’s website, or having to scra

Flaws in widely used corporate VPNs put company secrets at risk

Researchers have found several security flaws in popular corporate VPNs which they say can be used to silently break into company networks and steal business secrets. Devcore researchers Orange Tsai a