Home Security News

Security News

To help you stay up to date with developments in web security, Packt Hub provides news and expert insights. We work with thought leaders to bring you the best advice about topics like malware analysis and penetration testing.

DefCon 27

At DefCon 27, DARPA’s $10 million voting system could not be hacked by Voting...

At the DefCon security conference in Las Vegas, for the last two years, hackers have come to the Voting Village every year to scrutinize...
Microsoft contractors also listen to Skype and Cortana audio recordings

Microsoft contractors also listen to Skype and Cortana audio recordings, joining Amazon, Google and...

In a recent report, Motherboard reveals, “Contractors working for Microsoft are listening to personal conversations of Skype users conducted through the app's translation service.”...

Black Hat USA 2019 conference Highlights: IBM’s ‘warshipping’, OS threat intelligence bots, Apple’s $1M...

The popular Black Hat USA 2019 conference was held from August 3 - August 8 at Las Vegas. The conference included technical training sessions...
Kubernetes security

CNCF-led open source Kubernetes security audit reveals 37 flaws in Kubernetes cluster; recommendations proposed

Last year, the Cloud Native Computing Foundation (CNCF) initiated a process of conducting third-party security audits for its own projects. The aim of these...

Cybersecurity researcher “Elliot Alderson” talks Trump and Facebook, Google and Huawei, and teaching kids...

For anyone that's watched Bad Robot, the name Elliot Alderson will sound familiar. However, we're not talking about Rami Malek's hacker alter ego -...
Akon's new cryptocurrency city

Interstellar is developing Slingshot, a new Rust based blockchain architecture to support zero-knowledge smart...

In September 2018, LightYear acquired Chain to form a combined company called Interstellar. The company is working on a new blockchain architecture with a...
Apple iOS 12 beta 2

Google’s Project Zero reveals several serious zero-day vulnerabilities in a fully remote attack surface...

Security analysts from Google’s Project Zero investigated the remote attack surface of the iPhone and reviewed SMS, MMS, VVM, Email, and iMessage. They found...
Fancy bear

Microsoft reveals Russian hackers “Fancy Bear” are the culprit for IoT network breach in...

Two days ago, Microsoft revealed that Russian hackers are attempting to compromise IoT devices including a VOIP, a printer, and a video decoder across...
NetSpectre attack exploits data from CPU memory

AT&T employees were bribed over $1 million for assisting hackers to illegally unlock cellphones,...

Yesterday the United States’ Department of Justice (DOJ) stated that Muhammad Fahd, a 34-year-old citizen of Pakistan had bribed the employees from AT&T’s Seattle-area...
security

What is a Magecart attack, and how can you protect your business?

Recently, British Airways was slapped with a $230M fine after attackers stole data from hundreds of thousands of its customers in a massive breach....

Sign up for tech news & special offers

Must Read in Security

iPhone can be hacked via a legit-looking malicious lightning USB cable...

While our phones are running low on battery, we do not think twice before inserting a USB to charge it. Also, while transferring files...

Interviews