Riot Games hack could help cheaters

Last week, the video game giant Riot Games revealed that hackers had compromised its “development environment” — where the company stores its source code — with a social engineering attack. Wh

Surveillance camera vulnerability could allow hackers to spy on and alter recordings

In newly published research, security firm Tenable reveals how popular video surveillance camera software could be manipulated, allowing would-be attackers the ability to view, disable or otherwise ma

Crunch Report | Amazon Buys Souq

Amazon buys Souq, the "Amazon of the Middle East," Apple acquires Workflow, Instagram blurs sensitive photos and adds two-factor authorization while Facebook rolls out mention alerts and reaction emoj

PegaSwitch is an easy exploit toolkit for the Nintendo Switch

A day after the world got confused whether or not the Switch was truly hacked, a group of programmers have released PegaSwitch, a "toolkit" that allows for limited code execution, allowing users to ex

What You Need To Know About Shellshock

Another week, another massive security vulnerability that is almost a household name. How bad is it? Really bad. According to Matt Harrigan of PacketSled, “It’s really pretty astonishing h

WebOS vulnerability found, patched by Palm in latest release

<img src="http://www.mobilecrunch.com/wp-content/uploads/2010/04/prepre.png" />What to make of this <a HREF="http://www.crunchgear.com/tag/webos/">WebOS</a> exploit? It was discovered by the Intrepidu

Windows 7 exploit (the first?) confirmed by Microsoft

<img src="http://www.crunchgear.com/wp-content/uploads/2009/11/win7.png" /><a HREF="http://www.crunchgear.com/tag/windows-7/">Windows 7</a> users would be well-advised to block outgoing ports 139 and

Correction: Firefox vulnerability update

Just a quick update on something we posted yesterday concerning a security vulnerability found in Mozilla’s Firefox web browser (see the original post here). First, this incident was NOT a zero day

Classy CIA exploit makes you part of the .GOV

In line with the government-certified 8GB flash drive we just posted here’s a fun trick you can play on your local G-Men. There’s a search exploit at cia.gov that lets you type in any URL

Microsoft Word vulnerability confirmed

A vulnerability found in Microsoft’s Jet Database Engine — the engine that shares data between Microsoft Office products and other apps — has been confirmed by Microsoft to be the ar

Exploit makes iPhone a Spyphone*

Now this is scary. That iPhone in your pocket just might be your worst enemy. Ultranerd Rik Farrow, at the behest of Fast Company, has discovered a way to trick iPhone users into downloading malware t

The iPhone/Touch TIFF exploit explained in the cold poetry of code

Remember that weird TIFF exploit they used to get the iPhone/Touch to jailbreak itself? Neither do we. However, here is the source code for generating the improper and massive TIFF that is needed to g

Safari For Windows Updated To 3.0.1, Fixes Exploits

Apple just released Safari 3.0.1 for Windows, which fixes a few of those exploits we mentioned the other day. The update doesn’t apply to the Mac version of the public beta since Macs are inhere

0day Exploit For Safari For Windows Spotted

Apple released its Safari Web browser for Windows (and Mac!) yesterday. There’s already a so-called 0day exploit for it, one that causes the browser to instantly crash when visiting a specific W

Mac Users Don't Do Security Says Some Brit, Some Other Guy from Ohio

A fellow by the name of Kevin Finisterre has been posting OS X security holes and bugs on his website every day. Some aren’t too happy that Finisterre is doing this as it could let otherwise clu