35C3 Day One: Security, Art and Hacking
Conference showcases cutting-edge cybersecurity research, hacking collectives and art.
Conference showcases cutting-edge cybersecurity research, hacking collectives and art.
Proof-of-concept hack of a voicemail systems shows how it can lead to account takeovers multiple online services.
The home surveillance cams have hard-coded credentials.
Researcher at ESET outlines research on the first successful UEFI rootkit used in the wild.
Woman who helped hide Edward Snowden faces uncertain future and says she has no regrets.
Facebook tracks Android users via apps, even if they aren’t Facebook users.
Cryptocurrency wallets Trezor and Ledger are vulnerable to a number of different type attacks, researchers say.
Reports have linked the attack to the Ryuk ransomware.
Vulnerabilities, stolen credentials and an evolution of marketplaces mark the Dark Web in Q3.