Over the weekend, iPhone owners worldwide were warned about the potentially serious implications of an obscure new iPhone hack. Now new developments strongly suggest those fears are about to come true ...
Earlier today (see below) I posted a story about about two hackers from the Black Hat conference in Las Vegas and how they supposedly demonstrated how to exploit a vulnerability in Apple's wireless ...
Bending various proprietary devices to our will is a hacker’s rite of passage. When it comes to proprietary wall sockets, we’d often reverse-engineer and emulate their protocol – but you can ...
As it turns out, there’s more to worry about than hacking from the cloud. New research from Ben-Gurion University in Israel has shown it is possible to hack into computers that aren’t connected to the ...
One day after it disclosed a security vulnerability in a wireless networking product, Cisco Systems must contend with a new threat – the long-promised release of a hacking tool that targets wireless ...
A Michigan man pleaded guilty on Friday to four counts of wire fraud and unauthorized access to a computer after he and two accomplices used a vulnerable wireless network at a Lowe’s Companies store ...
If you use PHP, you likely use the Composer tool for managing dependencies, at least indirectly. And the good folks at SonarSource found a nasty, potential supply chain attack in this tool, when used ...
Security researchers David Maynor and Jon Ellch performed a digital drive-by Wednesday at the Black Hat USA conference. Their target: an Apple MacBook. The pair have found ways to seize control of ...
The most commonly used protocol for securing wireless networks has been cracked. How much risk does this development mean for your network? You shouldn't lose any sleep over the hack -- but you ...
I love demos. They’re an endless source of unexpected entertainment. For example, at a wireless security conference back in April I saw an “Attacks Live” demo that gave me some idea of just how easy ...