Your Gym Locker May Be Hackable
Thousands of electronic lockers found in gyms, offices, and schools could be vulnerable to attacks by criminals using cheap hacking…
The best hacks and security research from Black Hat and Def Con 2024
Thousands of hackers, researchers and security professionals descended on the Black Hat and Def Con security conferences in Las Vegas…
CrowdStrike accepts award for ‘most epic fail’ after global IT outage
Just a few weeks after its software update triggered a global IT meltdown, CrowdStrike isn’t shying away from the spotlight. In…
How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards
Finally, HID says that “to its knowledge,” none of its encoder keys have leaked or been distributed publicly, and “none…
Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All
If you know where to look, plenty of secrets can be found online. Since the fall of 2021, independent security…
The Hacker Who Hunts Video Game Speedrunning Cheaters
The night before Cecil's Defcon talk, Maselewski wrote in a final email to WIRED that he believes those alleging that…
Apple Prototypes and Corporate Secrets Are for Sale Online—If You Know Where to Look
It's probably been a while since anyone thought about Apple's router and network storage combo called Time Capsule. Released in…
After global IT meltdown, CrowdStrike courts hackers with action figures and gratitude
On Wednesday morning, thousands of cybersecurity professionals swarmed the halls of the Mandalay Bay Convention Center in Las Vegas, the…
Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs
Demand for graphics processing units or GPUs has exploded in recent years as video rendering and artificial intelligence systems have…
Flaws in Ubiquitous ATM Software Could Have Let Attackers Take Over Cash Machines
There is a grand tradition at the annual Defcon security conference in Las Vegas of hacking ATMs. Unlocking them with…