vulnerabilities
A Simple Exploit is Exposing the Biggest Apps on the Internet
iCloud, Steam, Minecraft, and several others are all vulnerable to a vulnerability that is trivially easy for hackers to exploit.
Researcher Publishes Source Code for Three Unpatched iPhone Exploits
The researcher's decision to do a full-disclosure of the unpatched bugs shows that Apple is still struggling with its bug bounty program.
Cellebrite Pushes Update After Signal Owner Hacks Device
The law enforcement forensics provider updated some of its products a few days after a security researcher claimed to have found critical vulnerabilities in Cellebrite’s devices.
Researchers Secure Bug Bounty Payout to Help Raise Funds for Infant’s Surgery
A couple needed to raise funds to cover the costs of their daughter's upcoming heart surgery. This security researcher found a serious bug, and then donated part of the bounty to support the family.
Bugs Allowed Hackers to Dox John Deere Tractor Owners
A security researcher found two bugs that allowed him to find customers who had purchased John Deere tractors or equipment.
Postal Service Used Apps That Had ‘Catastrophic’ Vulnerabilities for Years
The USPS Office of Inspector General found that the Postal Service was using several applications laded with vulnerabilities that could have led to a hack with a potential financial impact of over $1 billion.
Apple Will Start Sending Special Devices to iPhone Hackers
Apple officially launched the iPhone Research Device Program, and will send iPhone hackers and security researchers special devices that will make it easier for them to find bugs and vulnerabilities.
How Google Changed the Secretive Market for the Most Dangerous Hacks in the World
For five years, Google has funded Project Zero, a team of hackers with the sole mission of finding bugs in whatever software they wanted to research, be it Google’s or somebody else’s. Are they making the internet safer?
Security Researchers Find Several Bugs in Nest Security Cameras
Cisco Talos researchers report finding eight security vulnerabilities in the Nest Cam IQ that can allow attackers to take over the camera, prevent its use or allow code execution.
Cybersecurity Firm Drops Code for the Incredibly Dangerous Windows ‘BlueKeep’ Vulnerability
Researchers from U.S. government contractor Immunity have developed a working exploit for the feared Windows bug known as BlueKeep.
Hackers Hijacked VR Chatrooms to Manipulate Users' Reality
Security researchers found critical vulnerabilities in three different virtual reality applications that would have allowed hackers to take control of victims’ computers.
Bugs on Epic Games Site Allowed Hackers to Login to Any ‘Fortnite’ Player’s Account
A security firm found that hackers could have logged into the accounts of any Fortnite player, potentially stealing their credit card information, or listening in on their conversations.