Vulnerability

Password cracking vulnerability in Oracle database

By

Attackers could link password hash with specific session key to crack users' passwords.

Twitter adds famed security expert to team

By

Charlie Miller, well-known for his work in penetration testing, will be joining Twitter's security team.

Google increases rewards for bug and exploit finding

By

Google is raising the stakes for researchers who can show exploits and discover vulnerabilities in its Chrome browser.

Black Hat: NFC exploit could overtake mobile device through a simple graze

By

A vulnerability found in near field communication could enable attackers to swipe information from end-users by simply brushing their phone with a malicious tag, according to an expert at this year's Black Hat conference.

Black Hat Video: Hotel room locks may not stay locked

Black Hat Video: Hotel room locks may not stay locked

SC Magazine chats with security researcher, Cody Brocious, who discovered a vulnerability in more than four million hotel room locks.

iTunes vulnerability may enable remote code execution

By

A flaw in Apple's popular music player allows for miscreants to execute remote code.

Threat of the month: Chrome exploit

Threat of the month: Chrome exploit

Sign up for our newsletters

POLL