exploit

A day after reporters published their first hands-on review of Apple’s Vision Pro, the technology giant released its first security patch for the mixed reality headset to fix a vulnerability…

Apple fixes zero-day bug in Apple Vision Pro that ‘may have been exploited’

A developer is attempting to reverse-engineer APIs to grant anyone free access to popular AI models like OpenAI’s GPT-4 — legal ramifications be damned. The developer’s project, GPT4Free, blew up…

A developer exploited an API flaw to provide free access to GPT-4

A number of popular services, including Apple iCloud, Twitter, Cloudflare, Minecraft and Steam, are reportedly vulnerable to a zero-day vulnerability affecting a popular Java logging library. The vulnerability, dubbed “Log4Shell”…

Apple iCloud, Twitter and Minecraft vulnerable to ‘ubiquitous’ zero-day flaw

Homeland Security’s cybersecurity advisory unit has issued a rare emergency alert to government departments after the recent disclosure of a “critical”-rated security vulnerability in server versions of Microsoft Windows. The…

Homeland Security issues rare emergency alert over ‘critical’ Windows bug

Black Hat and Def Con came and went as quickly as it ever does. The week-long pair of back-to-back conferences, referred to as “hacker summer camp,” draws in the security…

What security pros need to know from Black Hat & Def Con 2019

Homeland Security’s cyber agency says it has tested a working exploit for the BlueKeep vulnerability, capable of achieving remote code execution on a vulnerable device. To date, most of the…

Homeland Security has tested a working BlueKeep remote code execution exploit

Homeland Security has given the maximum severity score for a vulnerability in a popular smart building automation system. Optergy’s Proton allows building owners and managers to remotely monitor energy consumption…

A backdoor in Optergy tech could remotely shut down a smart building ‘with one click’

Security researchers have found two severe vulnerabilities affecting several popular wireless access points, which — if exploited — could allow an attacker to compromise enterprise networks. The two bugs are…

A pair of new Bluetooth security flaws expose wireless access points to attack

A security researcher has published details of a vulnerability in a popular cloud storage drive after the company failed to issue security patches for over a year. Remco Vermeulen found…

Password bypass flaw in Western Digital My Cloud drives puts data at risk

Security researcher Mathy Vanhoef publicly disclosed a serious vulnerability in the WPA2 encryption protocol today. Most devices and routers currently rely on WPA2 to encrypt your WiFi traffic, so chances are…

Here’s what you can do to protect yourself from the KRACK WiFi vulnerability

Lost and stolen iOS devices could be at risk if ne’er-do-wells learn of this blunt-force method of getting past Activation Lock. No special equipment or technical know-how is required, which…

Copy and paste trick could unlock iOS 10 devices in Lost Mode

A site called SnapchatDB.info has saved usernames and phone numbers for 4.6 million accounts and made the information available for download. SnapchatDB says that it got the information through a…

Confirmed: Snapchat Hack Not A Hoax, 4.6M Usernames And Numbers Published
Hardware

An analysis of a PDF exploit

Most people think of PDF documents as static pieces of information. How could a PDF file compromise your computer? The reality is that PDF documents can contain all sorts of…

A new “exploit” has been revealed for Linux systems running kernel 2.6.30 and 2.6.30.1. I put that in quotes for several reasons. First, those versions of the kernel haven’t been…

Have iPhone, be careful. According to a new New York Times article, a computer security firm has discovered a flaw in the iPhone that allows someone to take complete control…