Bugs on Epic Games Site Allowed Hackers to Login to Any ‘Fortnite’ Player’s Account
A security firm found that hackers could have logged into the accounts of any Fortnite player, potentially stealing their credit card information, or listening in on their conversations.
The Internet Has a Huge C/C++ Problem and Developers Don't Want to Deal With It
What do Heartbleed, WannaCry, and million dollar iPhone bugs have in common?
Apple Has Started Paying Hackers for iPhone Exploits
Despite their value in the grey market, security researchers are reporting bugs as part of the Apple iOS Bug Bounty program, and some are getting rewards.
An Exploit Left Millions of Steam Users Vulnerable for the Past 10 Years
A security researcher found a serious vulnerability that allowed hackers to take control of a Steam user’s computer.
Can AMD Vulnerabilities Be Used to Game the Stock Market?
A shady financial firm tried to bury and short sell AMD based on several security vulnerabilities discovered by CTS Labs. But the tactic appears to have failed.
Researchers Say AMD Processors Have Serious Vulnerabilities and Backdoors
Security researchers announced a series of 13 vulnerabilities within AMD’s RYZEN and EPYC processors that could make some data breaches even worse.
Bug in Google's Bug Tracker Lets Researcher Access List of Company's Vulnerabilities
A series of bugs allowed hackers to snoop into one of Google’s most sensitive internal systems.
Hackers Could Silently Hack Your Cellphone And Computers Over Bluetooth
Security researchers reveal several new bugs that allowed hackers to hack into cellphones and computers simply because they had Bluetooth on.
'Counter-Strike' Bug Allowed Hackers to Completely Own Your Computer with a Frag
Boom, remote code execution!
Google Hacker Finds Way To Exploit Yet Another ‘Stagefright’ Bug
One year later, Stagefright still leaves some Android phones vulnerable to hacks.
Zero-Day Hunters Will Pay Over Twice as Much as Apple’s New Bug Bounty Programme
Exodus Intelligence’s new programme offers a potential payout of half a million dollars for Apple vulnerabilities.
The FBI Is Classifying Its Tor Browser Exploit Because 'National Security'
Experts say the move indicates a lack of organization or technical capabilities within the FBI.