hacking

Fortnite bugs put accounts at risk of takeover

With one click, any semi-skilled hacker could have silently taken over a Fortnite account, according to a cybersecurity firm that says the bug is now fixed. Researchers at Check Point say the three vu

Some of the biggest web hosting sites were vulnerable to simple account takeover hacks

A security researcher has found, reported and now disclosed a dozen bugs that made it easy to steal sensitive information or take over any customer’s account from some of the largest web hostin

Security flaw in DJI’s website and apps exposed accounts to hackers and drone live feeds

It took about six months for popular consumer drone maker DJI to fix a security vulnerability across its website and apps, which if exploited could have given an attacker unfettered access to a drone

A pair of new Bluetooth security flaws expose wireless access points to attack

Security researchers have found two severe vulnerabilities affecting several popular wireless access points, which — if exploited — could allow an attacker to compromise enterprise networks. The t

Password bypass flaw in Western Digital My Cloud drives puts data at risk

A security researcher has published details of a vulnerability in a popular cloud storage drive after the company failed to issue security patches for over a year. Remco Vermeulen found a privilege es

Hacking the websites responsible for election information is so easy an 11-year-old did it

It’s time to talk about election security. Over the weekend at Def Con, the annual hacker convention in Las Vegas to discuss some of the latest and greatest (or scariest) trends in the wild worl

Canadian Yahoo hacker gets a five-year prison sentence

After pleading guilty in November, the Canadian hacker at least partially to blame for the massive Yahoo hack that exposed up to 3 billion accounts will face five years in prison. According to the Jus

What do Meltdown, Spectre and RyzenFall mean for the future of cybersecurity?

The security community is still reeling from the discoveries of the Meltdown and Spectre computer vulnerabilities, and now it seems that a rash of new hardware vulnerabilities called MasterKey, RyzenF

The United States needs a Department of Cybersecurity

This week more than 40,000 security professionals will attend RSA in San Francisco to see the latest cyber technologies on display and discuss key issues. No topic will be higher on the agenda than th

Senate Intel Committee gives Homeland Security its election security wish list

In a press conference today, the Senate Select Committee on Intelligence presented its urgent recommendations for protecting election systems as the U.S. moves toward midterm elections later this year

Despite Uber debacle, HackerOne’s CEO argues why every company should work with hackers

In November, Uber disclosed that a year earlier, hackers stole 57 million driver and rider accounts and that it paid them a $100,000 ransom to delete the information. The breach was reportedly part of

Aperio raises a $4.5M seed round to protect power plants from hackers

Protecting critical infrastructure like power plants and other industrial plants is just as important as it’s challenging. It’s one thing to take over a remote machine to mine some Bitcoin

Britain’s spy agency can’t stop losing cyber talent to major tech companies

The NSA isn't the only secretive national intelligence agency having trouble keeping its tech-savvy recruits. In a new document from the Intelligence and Security Committee of Parliament, Britain's sp

Shape Security introduces tool to blunt impact of stolen password caches

Shape Security is a company you may never heard of, yet it’s been around for five years and its founders include former Googlers and DoD officials. Their products provide the primary line of def

Averon closes $8.3M funding to make your smartphone the key to ID online

Because of the threat of cyber attacks, sign in and identity verification procedures are becoming utterly cumbersome. There’s no “identity” layer to the internet (until there is a mainstream Blo

Kaspersky fights spying claims with code review plan

Russian cybersecurity software maker Kaspersky Labs has announced what it's dubbing a "comprehensive transparency initiative" as the company seeks to beat back suspicion that its antivirus software h

Google launches “strongest security” opt-in program for high risk users

Google has today launched a free, opt-in program aimed at users who believe their Google accounts -- such as Gmail, Drive, YouTube etc -- to be at particularly high risk of targeted online attacks.

Legal fight against UK state hacking seeks crowdfunds

Privacy rights group, Privacy International, is running a crowdfunding campaign to try to raise funds to help cover its legal costs as it continues to challenge the UK government's use of hacking as a

New Bluetooth vulnerability can hack a phone in 10 seconds

Security company Armis has found a collection of eight exploits, collectively called BlueBorne, that can allow an attacker access to your phone without touching it. The attack can allow access to comp

EU defense ministers take part in first cyber war game

European Union defense ministers have been taking part in a simulated cyber attack exercise today for the first time to practice strategic decision making and crisis-management under pressure of a (mo
Load More