Bugs on Epic Games Site Allowed Hackers to Login to Any ‘Fortnite’ Player’s Account

A security firm found that hackers could have logged into the accounts of any Fortnite player, potentially stealing their credit card information, or listening in on their conversations.
Lorenzo Franceschi-Bicchierai

The Internet Has a Huge C/C++ Problem and Developers Don't Want to Deal With It

What do Heartbleed, WannaCry, and million dollar iPhone bugs have in common?
Alex Gaynor
Internet Insecurity

Apple Has Started Paying Hackers for iPhone Exploits

Despite their value in the grey market, security researchers are reporting bugs as part of the Apple iOS Bug Bounty program, and some are getting rewards.
Lorenzo Franceschi-Bicchierai
Internet Insecurity

An Exploit Left Millions of Steam Users Vulnerable for the Past 10 Years

A security researcher found a serious vulnerability that allowed hackers to take control of a Steam user’s computer.
Lorenzo Franceschi-Bicchierai
Internet Insecurity

Can AMD Vulnerabilities Be Used to Game the Stock Market?

A shady financial firm tried to bury and short sell AMD based on several security vulnerabilities discovered by CTS Labs. But the tactic appears to have failed.
Lorenzo Franceschi-Bicchierai
Internet Insecurity

Researchers Say AMD Processors Have Serious Vulnerabilities and Backdoors

Security researchers announced a series of 13 vulnerabilities within AMD’s RYZEN and EPYC processors that could make some data breaches even worse.
Lorenzo Franceschi-Bicchierai
Internet Insecurity

Bug in Google's Bug Tracker Lets Researcher Access List of Company's Vulnerabilities

A series of bugs allowed hackers to snoop into one of Google’s most sensitive internal systems.
Lorenzo Franceschi-Bicchierai
Internet Insecurity

Hackers Could Silently Hack Your Cellphone And Computers Over Bluetooth

Security researchers reveal several new bugs that allowed hackers to hack into cellphones and computers simply because they had Bluetooth on.
Lorenzo Franceschi-Bicchierai

'Counter-Strike' Bug Allowed Hackers to Completely Own Your Computer with a Frag

Boom, remote code execution!
Lorenzo Franceschi-Bicchierai

Google Hacker Finds Way To Exploit Yet Another ‘Stagefright’ Bug

One year later, Stagefright still leaves some Android phones vulnerable to hacks.
Lorenzo Franceschi-Bicchierai

Zero-Day Hunters Will Pay Over Twice as Much as Apple’s New Bug Bounty Programme

Exodus Intelligence’s new programme offers a potential payout of half a million dollars for Apple vulnerabilities.
Joseph Cox

The FBI Is Classifying Its Tor Browser Exploit Because 'National Security'

Experts say the move indicates a lack of organization or technical capabilities within the FBI.
Joseph Cox