What if someone threw a hacker conference, and nobody showed up?As I boarded a United flight at SFO on March 17, the first day of San Francisco’... Read More...
Whether spreading malware or disinformation, attackers study their targets, create artifacts, and get the artifacts in front of their targets. So why not combat fake news like malware?
IOActive’s director of penetration testing says memsad causes software to expose passwords, keys, and tokens we use to protect our data. And the rot has spread far and wide.
Symantec researchers say Inception Framework is hijacking vulnerable old routers to forward malicious traffic and thus obscure the source of its advanced persistent threats.
At hacking contests like Pwn2Own, individual hackers can shine. Participating companies, meanwhile, can find and recruit badly needed talent, as they build hacker-friendly reputations.