The Department of Defense announced that registration for its Hack the Pentagon bug bounty trial program is open, and that the program will be run on the HackerOne platform.
Browsing Category: Vulnerabilities
Check Point has discovered a weakness that allows hackers to use phishing to carry out man-in-the-middle attacks between iOS devices and mobile device management tools and allow an attacker to push malicious apps to devices.
Insider trading is believed to be the motive behind two big-name legal firms that were hacked, say experts.
More than 1,400 vulnerabilities that exist in a widely used drug cabinet system won’t be patched according to an ICS-CERT advisory.
MedStar Health is the latest healthcare provider to fall victim to ransomware in escalating attacks targeting hospitals.
Hackers are escalating recent attacks against hospitals with new stains of server-side ransomware whose most recent variants are dubbed SamSam and Maktub.
Truecaller, an app that specializes in phone call management, has patched a hole that inadvertently leaked user information.
The FBI has cracked the encryption on the San Bernardino shooter’s iPhone and told the court it no longer needs Apple’s help.
Researchers found 50 cross site scripting vulnerabilities in the popular open source shopping cart application Zen Cart.
Facebook was quick to fix an issue earlier this month that could’ve let an attacker break into four percent of all active, locked accounts.