The USPS Office of Inspector General found that the Postal Service was using several applications laded with vulnerabilities that could have led to a hack with a potential financial impact of over $1 billion.
Apple officially launched the iPhone Research Device Program, and will send iPhone hackers and security researchers special devices that will make it easier for them to find bugs and vulnerabilities.
For five years, Google has funded Project Zero, a team of hackers with the sole mission of finding bugs in whatever software they wanted to research, be it Google’s or somebody else’s. Are they making the internet safer?
Cisco Talos researchers report finding eight security vulnerabilities in the Nest Cam IQ that can allow attackers to take over the camera, prevent its use or allow code execution.
Researchers from U.S. government contractor Immunity have developed a working exploit for the feared Windows bug known as BlueKeep.
Security researchers found critical vulnerabilities in three different virtual reality applications that would have allowed hackers to take control of victims’ computers.
A security firm found that hackers could have logged into the accounts of any Fortnite player, potentially stealing their credit card information, or listening in on their conversations.
What do Heartbleed, WannaCry, and million dollar iPhone bugs have in common?
Despite their value in the grey market, security researchers are reporting bugs as part of the Apple iOS Bug Bounty program, and some are getting rewards.
A security researcher found a serious vulnerability that allowed hackers to take control of a Steam user’s computer.
A shady financial firm tried to bury and short sell AMD based on several security vulnerabilities discovered by CTS Labs. But the tactic appears to have failed.
Security researchers announced a series of 13 vulnerabilities within AMD’s RYZEN and EPYC processors that could make some data breaches even worse.