How an NSA researcher plans to allow everyone to guard against firmware attacks
The work is the culmination of seven years worth of research into the security of firmware.
'Thunderclap' collection of hardware vulnerabilities affects Mac, Windows, Linux systems
Many modern computers are vulnerable to a number of security flaws that could exploit a machine’s Thunderbolt connection to its network cards, keyboard, computer charger or other peripheral devices.
$45,000 bounty offered for Linux zero days
The $15,000 price bump is likely a result of higher demand.
Industry braces for critical Intel security flaw impacting a decade's worth of chips
A critical security flaw in Intel processors will require an overhaul of operating system kernels after research found that decades worth of chips could be impacted by the vulnerability.
BlueBorne: The latest Bluetooth vulnerability that impacts billions of devices
"These vulnerabilities are the most serious Bluetooth vulnerabilities identified to date," Armis researchers explained.
SSH inventor analyzes tools the CIA wrote to exploit his protocol
The CIA hacking tools called Gyrfalcon and BothanSpy, as described in documents released by anti-secrecy group WikiLeaks, are "effective, but surprisingly unsophisticated," according to Tatu Ylonen.