Security researcher Dale “Woody” Wooden explains how a hacker could manipulate Ford key fob radio frequency signals to unlock, manipulate, or start the engine of at least two newer Ford models.
Unlike its competitors, the Backstory security data platform, built on Google’s robust infrastructure, is built to retain and surface even years-old Internet traffic data by default.
Over four years, Marriott hackers accessed millions of guest records, including names, mailing and email addresses, passport numbers, and birth dates. Here’s what we’re learning.
Like last week’s Kavanaugh hearings, Facebook’s acknowledgment of a cyberattack that led to a mass account reset alarmed officials and left key questions unanswered.
Watering-hole attacks use predator tactics to improve attackers’ odds of infiltrating large organizations. They’re hard to detect or defend—and they can have devastating effects.
Distributed denial-of-service (DDoS) attacks, which hackers have used for decades to pester online organizations, are expected to plague the Internet of Things. Here’s why.
Once inside a gas station’s connected management system, researchers say, hackers could manipulate fuel tanks or pumps, steal gas, hack security cameras, or skim payments.
A hack of the Nao humanoid robot, researchers say, demonstrates that cutting-edge consumer robots are just as susceptible to malware attacks as computers or phones.
Exploits for vulnerabilities in Wi-Fi, Microsoft Office, and encryption keys are making waves. One is called KRACK. Here’s what security experts say we should make of them.
The CCleaner hack shows that even utilities can be used to hack unsuspecting targets. Software vendors need to verify that the software they distribute is secure, experts say, scrutinizing it from acquisition through routine updates.
On stage at Structure Security, The Parallax asks Yahoo’s former chief hacker what he learned from his time at Yahoo, why he left, and what other CISOs could glean from his experiences.
Retailers rely on point-of-sale readers to process purchases and protect customer data. Due to lax security within the devices and at stores, they make for tantalizing hacking targets.
While experts acknowledge that pacemaker hacks aren’t likely, the risk underscores a need for better communication among security researchers, doctors, the FDA, and medical-device manufacturers.
Addressing EVM vulnerabilities uncovered at DefCon—and plugging related holes across disparate election systems—would require years of concentrated work, experts say.
The “biggest cyberthreat” of the year isn’t just a problem for big businesses. Eager to pluck the lowest-hanging fruit, cybercriminals are increasingly targeting small organizations and consumers.
In the wake of stunted recounts in three closely contested states, security researchers argue that to ward off hacker manipulation of elections, municipalities must maintain and audit paper ballots.
Questions regarding the veracity and transparency of evidence lie at the center of the debate over whether to trust government accusations of culpability for cyberattacks and computer hacking.
The Yahoo microblogging service acknowledges that millions of its users’ account credentials have been compromised in recent years. Here’s how to regain control of and further secure yours.
The assumption that all map search results for businesses are accurate, legitimate, and locked down “is wrong,” says hacker Bryan Seely. Here’s how fake listings can put you and businesses at risk.
Properly protected vote databases are tough to hack, security experts say. But in places lacking up-to-date software, proper IT training, or a paper trail, hackers have an advantage.
With “flexibility and freedom” comes “multifaceted” threats to consumer safety. Here’s how browser developers ranging from Google to Mozilla are approaching today’s challenges.
White and black hats alike are successfully prying their way into Internet-connected devices ranging from cattle tags to tea kettles. We ask two experts about the long-term implications.
This one’s for you, Laremy Tunsil. Twitter hacks can create a social-media mess, but the cleanup could be as simple as changing your passwords and running a virus scan.
A hacker equipped with a $15 dongle and 15 lines of code can exploit the vulnerability to connect to, spy on, and control a computer using it, a Bastille security researcher says.
When your account gets hacked, you may feel as if your best online connection to friends has been shattered. Here’s how you get back to normal—and prevent another attack.
Makers of the Internet of Things devices say they’re now taking security seriously, but researchers say that’s just not true—and it’s going to be a while before it is.