Source Boston keynoter Keren Elazari sounded a call to action for industry to extend an acceptance of hackers.
Browsing Category: Vulnerabilities
As Microsoft hardens its defenses with tools such as Control Flow Guard, researchers at Endgame are preparing for the reality of Counterfeit Object-Oriented Programming attacks to move from theoretical to real.
The Hack the Air Force bug bounty program invites white hats from inside and outside the U.S. to hack its websites.
At Source Boston, Josh Corman of the Atlantic Council said that healthcare is suffering from a lack of security talent, devices rife with vulnerabilities, and government incentivizing bad behavior.
A trove of consumer auto loan data—some 1 million records—has been locked down after a researcher found an exposed and accessible database online.
Atlassian reset user passwords for its group chat service HipChat on Monday following an incident that may have resulted in unauthorized access to a server used by the service.
Nearly two-thirds of servers and PCs peddled on the xDedic underground marketplace belong to schools and universities based in United States.
Adobe released an important security hotfix for several versions of Coldfusion, resolving two bugs, Tuesday morning.
Exploits for patched Android elevation of privilege vulnerabilities were published through the Zimperium N-Days Exploit Acquisition Program.
Hyundai Motor America patched its Blue Link mobile app after researchers found a cleartext encryption key that could be use to expose user and vehicle information.