Vulnerabilities

Security flaws in Honeywell devices could be used to disrupt critical industries

Security researchers have discovered numerous vulnerabilities in Honeywell devices used in critical industries that could, if exploited, allow hackers to cause physical disruption and potentially impa

GitLab’s new security feature uses AI to explain vulnerabilities to developers

Developer platform GitLab today announced a new AI-driven security feature that uses a large language model to explain potential vulnerabilities to developers, with plans to expand this to automatical

Hackers could remotely turn off lights, honk, mess with Tesla’s infotainment system

Thanks to three vulnerabilities chained together, malicious hackers could remotely hack into a Tesla, turn off the lights, honk the horn, open the trunk, activate the windshield wipers and mess with t

Gamers are fixing a video game ‘taken over’ by hackers

A popular first-person shooter game has significant vulnerabilities that allow malicious hackers to take over other players’ computers, as long as they are in the same online match. The situation is

Microsoft says attackers are hacking energy grids by exploiting decades-old software

Microsoft has warned that malicious hackers are exploiting a discontinued web server found in common Internet of Things (IoT) devices to target organizations in the energy sector. In an analysis publi

UK government is scanning British internet space for zero-day threats

The U.K.’s National Cyber Security Centre has launched a new program that will continually scan every internet-connected device hosted in the United Kingdom for vulnerabilities to help the governmen

Notes From Crazytown, Day Three: Black Hat Breakdown

So far this week, at Black Hat, I have learned to deeply mistrust: passwords, chip-and-PIN cards, USB devices, HTTPS connections, more than two billion phones, governments worldwide, all human societi

iPhone Vulnerabilities: The Password is "Dottie"

Hackers and security researchers have already found a nice collection of vulnerabilities in the iPhone, including an overflow issue in Safari that could allow unsigned code to infect the phone. The be

Apple WiFi Vulnerability was Fictitious

I’m sure you remember all that fuss about those holes in the Apple WiFi drivers. Well as reality would have it, those claims were erroneous. TUAW reports that SecureWorks, the company sponsoring