HITB GSEC Singapore (August 21st - 25th)
Register Online Now!
Bug hunters have gathered again to test their skills against some of the most popular and mature software programs during the Pwn2Own hacking contest. During the first day, they successfully demonstrated exploits against Microsoft Edge, Apple’s Safari, Adobe Reader, and Ubuntu Desktop.
The Pwn2Own contest runs every year during the CanSecWest security conference in Vancouver, Canada. It’s organized and sponsored by the Zero Day Initiative (ZDI), an exploit acquisition program operated by Trend Micro after its acquisition of TippingPoint.
Barely two weeks after going on sale, someone has hacked the Nintendo Switch console using an old Apple iOS flaw in a browser that’s not officially supposed to be on the machine.
Welcome to the odd universe of console hacking, by which we mean either jailbreaking or, failing that, making the machine do something interesting nobody knew was possible. For each new console these days, the story always starts as a race to be the first to find a way in.
We’re just a few days removed from the WikiLeaks publication, Vault 7, that outlined many of the supposed hacking tools at the disposal of the CIA. It has left tech firms scrambling for fixes and has raised questions over what products and services are most at risk, especially as the dust and sensationalism settles around just what kind of powers the CIA wielded with these so-called cyber weapons.
This week’s WikiLeaks revelations, which showed that the CIA can compromise a huge range of devices, shouldn’t send you into paroxysms of fear over your smartphone. It should, though, be a solid reminder that one of the best ways to keep yourself safe from hackers is also one of the simplest: Update your gear.
The security and privacy community was abuzz over the weekend after Google said it was open-sourcing E2Email, a Chrome plugin designed to ease the implementation and use of encrypted email. While this is welcome news, the project won't go anywhere if someone doesn't step up and take ownership of it.