Mark Dowd discusses why certain exploit mitigations have been so successful in driving up the cost of exploit development for attackers.
Browsing Category: Videos
A vulnerability in iOS 8, 9, 10, and even the most recent beta version, 10.2 beta 3, could allow an attacker to access photos and contacts on a locked iPhone.
More than one million consumer web-connected video cameras and DVRs are compromised by bot herders who use the devices for DDoS attacks, researchers say.
Researchers at Ben-Gurion University of Negev have found a way to take a run of the mill USB device and use it to leak data from an air gapped computers via RF signals.
Threatpost Editor in Chief Mike Mimoso talks to crypto pioneer and security expert Bruce Schneier of Resilient Systems about the early days of the RSA Conference, the integration of privacy and security, and the current FBI-Apple debate over encryption and surveillance.
Threatpost editor Mike Mimoso talks to Chris Valasek, Security Lead, Uber ATC, about the talk he and Charlie Miller gave at RSA, hacking cars, the challenges around getting manufacturers to patch vulnerabilities in vehicles, IoT, and more.
Threatpost Editor Mike Mimoso talks to Synack director of research and well-known OS X hacker Patrick Wardle about the discovery of an OS X malware dropper that likely was developed by the Hacking Team.
Threatpost editor Mike Mimoso talks with Santiago Pontiroli and Roberto Martinez, researchers with Kaspersky Lab’s Global Research and Analysis Team (GReAT) about ATM malware, jackpotting, and how it works in Latin America.
Threatpost editor Mike Mimoso talks with Dewan Chowdhury, the founder and CEO of MalCrawler, about hacking power grids and describes a honeypot they built to mimic an energy management system.
Threatpost editor Mike Mimoso talks with Sergey Lozhkin, senior researcher at Kaspersky Lab’s Global Research and Analysis Team about medical device security and how he was able to access some devices at his local hospital via WiFi.