Apple officially launched the iPhone Research Device Program, and will send iPhone hackers and security researchers special devices that will make it easier for them to find bugs and vulnerabilities.
"No researcher wants to end up in jail for discovering a vulnerability."
Join us on YouTube or Facebook to learn how hacking works.
When his rooting exploit worked on plenty of Android devices but failed on the Samsung Galaxy S7 Edge, researcher Di Shen decided to dig into KNOX.
Hackers can gain access to and manipulate flight information because of aging legacy systems.
"The attacks are completely non-intrusive: we did not modify the targets or open their chassis."
A security researcher also warns that crew members can easily hide evidence of accidents or malfeasance.
Researchers from Citizen Lab received the threats while investigating state-sponsored hacking in South America.
Researchers will demo a Stingray capable of attacking over LTE networks in Helsinki.
The US government wants to figure out what security researchers are up to.
The sites’ developer has since silenced the coder who found the hole.