T-Mobile Alerts 2.3 Million Customers of Data Breach Tied to Leaky API

T-Mobile alerts millions of its customers to a breach of its website that resulted in subscriber names, zip codes, phone numbers, email addresses and account numbers being stolen. Continue reading T-Mobile Alerts 2.3 Million Customers of Data Breach Tied to Leaky API

Black Hat Video Exclusive: Mobile APTs Redefining Phishing Attacks

Mike Murray, vice president of security intelligence at Lookout, discusses how mobile is redefining phishing, taking it out of the traditional inbox and into SMS and Facebook messages. Continue reading Black Hat Video Exclusive: Mobile APTs Redefining Phishing Attacks

DEF CON 2018: Critical Bug Opens Millions of HP OfficeJet Printers to Attack

A malicious fax sent to an HP Inc. OfficeJet all-in-one inkjet printer can give hackers control of the printer and act as a springboard into an attached network environment. Continue reading DEF CON 2018: Critical Bug Opens Millions of HP OfficeJet Printers to Attack

Hacking For Sport: A Journey in Reverse Engineering a Toshiba Wireless SD Card

Reverse engineering the Toshiba FlashAir SD storage card allowed a researcher to execute remote code – and could’ve allowed him to add other malicious or practical features. Continue reading Hacking For Sport: A Journey in Reverse Engineering a Toshiba Wireless SD Card

Google Bug Hunter Urges Apple to Change its iOS Security Culture

Project Zero researcher highlights stubborn iOS bugs as an example of why Apple and the rest of the industry needs to take a fresh approach to securing systems. Continue reading Google Bug Hunter Urges Apple to Change its iOS Security Culture