Explore seven characteristics of security risk from the dark and hidden web. Learn how organizations can capture the latent value of dark-sourced threat intelligence.
Hacking skills promote empathy, grit and creative problem solving — characteristics that can take teens far in their future careers, whether they pursue cybersecurity or any other field of study.
Global sporting events require heightened cybersecurity because of the expanded digitization of sports venues.
The concept of "hacking back" opens up a wide range of cyber defense tools to IT and security managers. Lawmakers are interested in new rules that allow for more flexibility with these activities.
Through a DolphinAttack experiment, a group of researchers from China discovered an easy way to compromise speech recognition software.
Security researchers have demonstrated how it is possible to use stickers to get computer vision systems in autonomous vehicles to wrongly identify signs.
Many companies have adopted the practice of recruiting a team of hackers to poke holes in their networks and assess their incident response capabilities.
Security researchers linked three cyber espionage campaigns to a group that exploits leaked Hacking Team tools and flaws in outdated software.
An 11-year-old boy used a clever Bluetooth hack to control his teddy bear and demonstrate that not even connected toys are immune to IoT security risks.
A recent Apple patch update addressed critical vulnerabilities discovered by contestants at this year's Pwn2Own hacking competition.