Vulnerabilities

Notes From Crazytown, Day Three: Black Hat Breakdown

So far this week, at Black Hat, I have learned to deeply mistrust: passwords, chip-and-PIN cards, USB devices, HTTPS connections, more than two billion phones, governments worldwide, all human societi

iPhone Vulnerabilities: The Password is "Dottie"

Hackers and security researchers have already found a nice collection of vulnerabilities in the iPhone, including an overflow issue in Safari that could allow unsigned code to infect the phone. The be

Apple WiFi Vulnerability was Fictitious

I’m sure you remember all that fuss about those holes in the Apple WiFi drivers. Well as reality would have it, those claims were erroneous. TUAW reports that SecureWorks, the company sponsoring