An 11-year-old boy used a clever Bluetooth hack to control his teddy bear and demonstrate that not even connected toys are immune to IoT security risks.
A recent Apple patch update addressed critical vulnerabilities discovered by contestants at this year's Pwn2Own hacking competition.
On April 10, Sierra Tel discovered that its IoT device modems had been bricked, possibly by a vigilante trying to neutralize rogue devices.
Hajime appears to have been created by a vigilante that is attempting to improve IoT device security and help IT decision-makers tighten defenses.
Hacked site numbers continue to increase, according to Google. Businesses must take steps to ensure their online properties are safe and secure.
Bug bounty programs are now paying out more to white-hat hackers, but they're also tightening regulations on payments and structure.
The classic image of the Hollywood hacker is misleading. The typical cybercriminal is more likely to be a state-sponsored actor or malicious insider.
A recent survey revealed that hackers can bypass security controls in under 12 hours. How can companies protect critical systems and eliminate new threats?
A new Metasploit hardware bridge enables IT professionals to hack their own hardware, reducing the complexity of device-based vulnerability testing.
An anonymous actor compromised mobile phone hacking company Cellebrite and stole 900 GM of potentially compromising information.