Hacking | News, how-tos, features, reviews, and videos
It's good to talk, but this is only a starting point, say observers
Researchers deserve to get paid well for finding serious vulnerabilities, but it shouldn't be at the expense of overall software security
Apple told devs to validate their copy of Xcode using a simple procedure -- but unless you have Xcode version 7.0, your copy may not pass the test
Using the validation method recommended by Apple, a check of a Xcode 6.4 -- downloaded from Apple servers -- came up negative. Here's how to check your copy
To avoid detection, some hackers are ditching malware and living 'off the land' -- using whatever tools are already available in the compromised systems
Not content to go after credit card info, hackers are honing in on health care data, which is much more valuable
The power grid may not be in immediate danger, but that doesn't mean the threat to critical infrastructure isn't there
Vendors without bug bounty programs risk the wrath of the infosec community, but such programs must be constructed carefully to yield optimal outcomes
Hacker accessed Bugzilla for at least a year, maybe two; gained insight into flaw before it was patched
Fraudsters increasingly rely on legitimate administrator tools instead of malware to successfully breach systems and steal data