Samsung denies its mobile payment platform is insecureThe algorithm doesn't operate as described, says the tech giant.By D. Lumb, 08.09.2016TwitterFacebookRedditMailShare
Apple announces $200,000 bug bounty programThe company is changing its tune on outside security researchers.By A. Dalton, 08.04.2016TwitterFacebookRedditMailShare
Carnegie Mellon may have ratted out Tor users to the FBIBy S. Dent, 11.12.2015TwitterFacebookRedditMailShare
Researchers can take complete control of Android phonesBy R. Baldwin, 08.06.2015TwitterFacebookRedditMailShare
Android fingerprint readers may be easier to hack than Touch IDBy S. Buckley, 08.05.2015TwitterFacebookRedditMailShare
A chat with Black Hat's unconventional keynote speakerBy V. Blue, 08.04.2015TwitterFacebookRedditMailShare
Researchers create a worm that infects Macs silently and permanentlyBy R. Baldwin, 08.03.2015TwitterFacebookRedditMailShare
Hackers can crack the self-aiming rifle to change its targetBy A. Tarantola, 07.29.2015TwitterFacebookRedditMailShare
Fiat Chrysler recalls 1.4 million vehicles after remote hackBy A. Souppouris, 07.24.2015TwitterFacebookRedditMailShare
Hurry up and patch your Chrysler against this wireless hackBy A. Tarantola, 07.21.2015TwitterFacebookRedditMailShare
'Blackhat' bores, but at least gets hacking rightBy D. Hardawar, 01.17.2015TwitterFacebookRedditMailShare
Blackhat trailer promises a hacking thriller, computer screens that beepBy M. Moon, 12.15.2014TwitterFacebookRedditMailShare
Researchers crack iPad PINs by tracking the fingers that enter themBy J. Rigg, 06.25.2014TwitterFacebookRedditMailShare
State-sponsored hackers are attacking news outlets on a massive scaleBy J. Fingas, 03.28.2014TwitterFacebookRedditMailShare
Apple: iOS 7 fixes the nefarious charger hackBy K. Hodgkins, 08.01.2013TwitterFacebookRedditMailShare
Pwnie Express' Pwn Plug R2 lets you hackproof networks over 4GBy A. Santos, 07.31.2013TwitterFacebookRedditMailShare
Automotive takeover schemes to be detailed at Defcon hacker conferenceBy D. Murph, 07.28.2013TwitterFacebookRedditMailShare
Some SIM cards can be hacked 'in about two minutes' with a pair of text messagesBy J. Rigg, 07.22.2013TwitterFacebookRedditMailShare