Netflix announced in a Medium post today that it is opening a public bug bounty program on the Bugcrowd bug bounty platform. The roots of the company’s bug hunting concept go back to 2013 when N
Every company is a tech company, and that's a big problem. Or rather, either every company is a tech company but most suck at it, or most aren't tech companies but should be. Either way, we're gonna h
Security researchers in China have invented a clever way of activating voice recognition systems without speaking a word. By using high frequencies inaudible to humans but which register on electronic
Niantic postpones its European Pokémon GO Event, Discovery Communications acquires Scripps Networks for $14.6 billion, Game of Thrones materials getting released in HBO hack and Reddit is now valued
By 2020, an estimated 75 percent of cars will be internet-connected worldwide, according to estimates from the FBI, Department of Transportation and the National Highway Traffic Safety Administration.
A report from Bloomberg paints a grim picture of left-leaning political groups being targeted by (apparently) Russian hackers; but don't worry: this seems to be more "open season on DC" than Russki cy
For the past several years, HackerOne has been helping customers build bug bounty programs to find vulnerabilities in their software, and today it hauled in a big bounty of its own — a $40 mill
Illusive Networks, a cybersecurity startup based out of Israel that protects networks by building “deception” frameworks to identify and trap malicious hackers, is today announcing that it
Nico Sell Contributor Nico Sell is the founder of Wickr Foundation, and co-founder and co-chairman at Wickr -- a self-destructing, secure, private, anonymous messaging service. More posts by this cont
Say you want to create the next generation of voice recognition-enabled, AI-ensmartened, buzzword-laden gadget. The fist thing you need to do is pick a platform. Arduino isn't powerful enough. The Ras
A 2015 data breach at UK ISP TalkTalk has landed the company with a £400,000 fine from the national data protection agency -- a record penalty for the ICO to hand out, although £100k shy of the curr
Here are four cybersecurity terms that will root many conversations, both on the expo floor and among experts and analysts in the briefing rooms at Black Hat.
Most of us think of website hacks as illicit activities aimed at siphoning critical information or disrupting the business of website owners. But what happens when your site becomes hacked, not for th
Russian hackers have had access to Democratic National Committee secret files -- including opposition research on Donald Trump -- for over a year, according to a new report in The Washington Post.
“If you can’t beat them, join them” may not sound like the most encouraging pitch for a cybersecurity company, but a startup called Cylance has created an artificial intelligence-po
Apple has shut down what appears to have been the first, fully-functional ransomware targeting Mac computers. This particular form of cyber threat involves malware that encrypts the data on your perso
With Apple vowing to resist the FBI’s demands for an iPhone backdoor in the San Bernardino case all the way to the Supreme Court, many people assume the company is motivated purely out of principle
The Internet of Things (IoT) presents a significant mix of opportunity and risk. Compared to the connected devices of the past, the gazillions of new IoT devices that are being predicted for our homes
When you visualize a hacker, what do you see? A young computer enthusiast coding in their basement, pounding Red Bull? A futuristic robot plugged into hundreds of servers deep inside a secret warehous
Greetings from the gaudy hellscape of Las Vegas, and that overcrowded maelstrom of surly hackers known as DEF CON! What follows is a brief rundown of the talks here (and its big corporate sister Black