Subscribe to Updates
Subscribe to our newsletter and be the first to access exclusive content and expert insights.
Browsing: Black Hat
Thousands of electronic lockers in gyms, offices, schools and more could be vulnerable to attacks by criminals using cheap hacking tools to access administrator keys, according…
In a final email to WIRED, on the eve of Cecil’s Defcon speech, Macielewski wrote that he believes those who allege he cheated are using flawed…
It’s been a long time since anyone thought about Apple’s all-in-one router and network storage, Time Capsule. Launched in 2008 and discontinued in 2018, it’s all…
A widespread flaw in ATM software could allow attackers to take control of automated teller machines
Defcon, the annual security conference in Las Vegas, has a grand tradition of hacking ATMs: unlocking them with safe-cracking techniques, tricking them to steal users’ personal…
Hundreds of millions of AMD chips have ‘sync close’ flaw, causing severe, virtually irreparable infection
In a background briefing to WIRED, AMD emphasized the difficulty of exploiting Sinkclose. To exploit the vulnerability, a hacker would need to already have access to…
Finally, HID stated that “to the best of its knowledge,” no encoder keys have been leaked or exposed, and “none of these issues have been exploited…
Researchers have long known that they can glean hidden information about the inner workings of a website by measuring the time it takes for various requests…
Other attacks Burghley created show how a hacker (who would also have already compromised an email account) could access sensitive information, such as people’s salaries, without…
Since the early 1990s, people have used doxxing – revealing someone’s identity online and taking away their anonymity – as a harmful way to exact digital…
“It’s not just a matter of water being cut off. When the only sewage treatment plant in the area stops working, really bad things start happening.…