
53.5% of websites have weak SSL setups—leaving attack surfaces exposed and increasing breach risk.
53.5% of websites have weak SSL setups—leaving attack surfaces exposed and increasing breach risk.
Recent cyberattacks reveal soft targets and harder problems
Just like our roads, bridges, electrical grid and airports will deteriorate without public investment, so will our software infrastructure without action.
As “P4x,” Alejandro Caceres single-handedly disrupted the internet of an entire country. Then he tried to show the US military how it can—and should—adopt his methods.
The company behind the Saflok-brand door locks is offering a fix, but it may take months or years to reach some hotels.
Behind the 1s and 0s, hackers are still people—and their motivations are more nuanced than you might think.
The attackers were in thousands of corporate and government networks. They might still be there now. Behind the scenes of the SolarWinds investigation.
Runa Sandvik has made it her life’s work to protect journalists against cyberattacks. Authoritarian regimes are keeping her in business.
We present a novel approach to infiltrate data to air-gapped systems without any additional hardware on-site.
An attack that targeted Apple devices was used to spy on China’s Muslim minority—and US officials claim it was developed at the country’s top hacking competition.
Cybersecurity experts tracing money paid by American businesses to Russian ransomware gangs found it led to one of Moscow’s most prestigious addresses.
The verdict is in! Following 37 nominations whittled down to a shortlist of 15 by a community vote, our panel of experts has conferred and selected the top 10 web hacking techniques of 2017 (and 2016)
International hackers based in Ukraine stole unpublished press releases and passed them to stock traders to reap tremendous profits.