(Getty Images) Hackers can still steal wads of cash from ATMs. Here’s the vulnerabilities that could let them in. Hackers may love ransomware, but ATM vulnerabilities still abound, Red Balloon Security researchers explain at DEF CON 2020. Aug 6, 2020 By Shannon Vavra
A semiconductor silicon wafer being tested. (Getty Images) Hacking group has hit Taiwan’s prized semiconductor industry, Taiwanese firm says The persistent espionage makes all the sense in the world. Aug 6, 2020 By Sean Lyngaas
(Getty Images) Gigabytes of ‘sensitive’ internal Intel documents dumped online The company confirmed the incident is under investigation. Aug 6, 2020 By Greg Otto
(Flickr / Gage Skidmore) Facebook removes accounts posing as Black Trump supporters It's the company's latest takedown for inauthentic behavior. Aug 6, 2020 By Jeff Stone
The façade of Capital One Bank Midtown Manhattan location. (Getty) US financial regulator fines Capital One $80 million over data breach The company says its improved its security practices since the incident. Aug 6, 2020 By Jeff Stone
U.S. Secretary of State Mike Pompeo on Wednesday offered up to $10 million in rewards for the identification or location of anyone trying to interfere in elections “through certain illegal cyber activities.” (Flickr / U.S. Secretary of Defense) State Department offers up to $10 million in rewards to ID hackers who interfere in election The offer comes as part of a program typically used to nab terrorism suspects. Aug 6, 2020 By Jeff Stone
The welcome screen of the virtual reality environment for aerospace workshops at DEF CON 2020. (Screenshot) DEF CON’s Aerospace Village looks to satellite hacking to improve security in space The aerospace hacking village at DEF CON is going to look pretty different this year. Aug 6, 2020 By Shannon Vavra
Christopher Wlaschin speaks Oct. 18, 2017, at CyberTalks in Washington, D.C. (CyberScoop) Top voting vendor ES&S publishes vulnerability disclosure policy "We think it’s important to have that safe harbor language out there to set expectations," said ESS's Chris Wlaschin. Aug 5, 2020 By Sean Lyngaas
An LG G8 ThinQ smartphone running the Android operating system. (Aaron Yoo / Flickr) Researchers found another way to hack Android cellphones via Bluetooth There's another Bluetooth vulnerability on the market, according to DBAPPSecurity research presented at Black Hat 2020. Aug 5, 2020 By Shannon Vavra
(Getty Images) The long-lasting consequences of Coalfire’s Iowa pentest fiasco The incident made national headlines last year, but the effects are still lingering. Aug 5, 2020 By Jeff Stone