A company that acquires and sells zero-day exploits — flaws in software that are unknown to the affected developer — is now offering to pay researchers $20 million for hacking tools that would all
This exploit isn’t the only problem Curve — and the broader crypto space — is facing.
Many projects and companies would simply give up if they’d been hacked and had hundreds of millions stolen from their ecosystem partners, but it appears Wormhole isn’t one of them.
Last week, the video game giant Riot Games revealed that hackers had compromised its “development environment” — where the company stores its source code — with a social engineering attack. Wh
In newly published research, security firm Tenable reveals how popular video surveillance camera software could be manipulated, allowing would-be attackers the ability to view, disable or otherwise ma
Amazon buys Souq, the "Amazon of the Middle East," Apple acquires Workflow, Instagram blurs sensitive photos and adds two-factor authorization while Facebook rolls out mention alerts and reaction emoj
A day after the world got confused whether or not the Switch was truly hacked, a group of programmers have released PegaSwitch, a "toolkit" that allows for limited code execution, allowing users to ex
Another week, another massive security vulnerability that is almost a household name. How bad is it? Really bad. According to Matt Harrigan of PacketSled, “It’s really pretty astonishing h
<img src="http://www.mobilecrunch.com/wp-content/uploads/2010/04/prepre.png" />What to make of this <a HREF="http://www.crunchgear.com/tag/webos/">WebOS</a> exploit? It was discovered by the Intrepidu
<img src="http://www.crunchgear.com/wp-content/uploads/2009/11/win7.png" /><a HREF="http://www.crunchgear.com/tag/windows-7/">Windows 7</a> users would be well-advised to block outgoing ports 139 and
Just a quick update on something we posted yesterday concerning a security vulnerability found in Mozilla’s Firefox web browser (see the original post here). First, this incident was NOT a zero day
In line with the government-certified 8GB flash drive we just posted here’s a fun trick you can play on your local G-Men. There’s a search exploit at cia.gov that lets you type in any URL
A vulnerability found in Microsoft’s Jet Database Engine — the engine that shares data between Microsoft Office products and other apps — has been confirmed by Microsoft to be the ar
Now this is scary. That iPhone in your pocket just might be your worst enemy. Ultranerd Rik Farrow, at the behest of Fast Company, has discovered a way to trick iPhone users into downloading malware t
Remember that weird TIFF exploit they used to get the iPhone/Touch to jailbreak itself? Neither do we. However, here is the source code for generating the improper and massive TIFF that is needed to g
Apple just released Safari 3.0.1 for Windows, which fixes a few of those exploits we mentioned the other day. The update doesn’t apply to the Mac version of the public beta since Macs are inhere
Apple released its Safari Web browser for Windows (and Mac!) yesterday. There’s already a so-called 0day exploit for it, one that causes the browser to instantly crash when visiting a specific W
A fellow by the name of Kevin Finisterre has been posting OS X security holes and bugs on his website every day. Some aren’t too happy that Finisterre is doing this as it could let otherwise clu