vulnerabilities

9.23.19

How Google Changed the Secretive Market for the Most Dangerous Hacks in the World

For five years, Google has funded Project Zero, a team of hackers with the sole mission of finding bugs in whatever software they wanted to research, be it Google’s or somebody else’s. Are they making the internet safer?

8.21.19

Security Researchers Find Several Bugs in Nest Security Cameras

Cisco Talos researchers report finding eight security vulnerabilities in the Nest Cam IQ that can allow attackers to take over the camera, prevent its use or allow code execution.

7.26.19

Cybersecurity Firm Drops Code for the Incredibly Dangerous Windows ‘BlueKeep’ Vulnerability

Researchers from U.S. government contractor Immunity have developed a working exploit for the feared Windows bug known as BlueKeep.

7.3.19

Hackers Hijacked VR Chatrooms to Manipulate Users' Reality

Security researchers found critical vulnerabilities in three different virtual reality applications that would have allowed hackers to take control of victims’ computers.

1.16.19

Bugs on Epic Games Site Allowed Hackers to Login to Any ‘Fortnite’ Player’s Account

A security firm found that hackers could have logged into the accounts of any Fortnite player, potentially stealing their credit card information, or listening in on their conversations.

11.15.18

The Internet Has a Huge C/C++ Problem and Developers Don't Want to Deal With It

What do Heartbleed, WannaCry, and million dollar iPhone bugs have in common?

Advertisement
9.14.18

Apple Has Started Paying Hackers for iPhone Exploits

Despite their value in the grey market, security researchers are reporting bugs as part of the Apple iOS Bug Bounty program, and some are getting rewards.

5.31.18

An Exploit Left Millions of Steam Users Vulnerable for the Past 10 Years

A security researcher found a serious vulnerability that allowed hackers to take control of a Steam user’s computer.

3.15.18

Can AMD Vulnerabilities Be Used to Game the Stock Market?

A shady financial firm tried to bury and short sell AMD based on several security vulnerabilities discovered by CTS Labs. But the tactic appears to have failed.

3.13.18

Researchers Say AMD Processors Have Serious Vulnerabilities and Backdoors

Security researchers announced a series of 13 vulnerabilities within AMD’s RYZEN and EPYC processors that could make some data breaches even worse.

10.30.17

Bug in Google's Bug Tracker Lets Researcher Access List of Company's Vulnerabilities

A series of bugs allowed hackers to snoop into one of Google’s most sensitive internal systems.

9.12.17

Hackers Could Silently Hack Your Cellphone And Computers Over Bluetooth

Security researchers reveal several new bugs that allowed hackers to hack into cellphones and computers simply because they had Bluetooth on.

0104