For decades, security researchers warned about techniques for hijacking virtualization software. Now one group has put them into practice.
Damage to the pipeline that runs between Russia and Germany is being treated as deliberate. Finding out what happened may not be straightforward.
New research shows how third-party apps could be exploited to infiltrate these sensitive workplace tools.
Peiter “Mudge” Zatko’s allegations about the social media platform renewed a sense of urgency for lawmakers to rein in Big Tech.
Plus: An unsecured database exposed face recognition data in China, ‘Cuba’ ransomware knocks out Montenegro, and more.
Researchers found that mobile applications contain keys that could provide access to both user information and private files from unconnected apps.
A hacker has formulated an exploit that provides root access to two popular models of the company’s farm equipment.
The Veterans Affairs’ VistA software has a vulnerability that could let an attacker “masquerade as a doctor,” a security researcher warns.
The company says an expansion of privacy features in Messenger is unrelated to a high-profile Nebraska abortion case.