Narrow your search
A researcher at ShmooCon demonstrates how browser hot keys can expose the internal network running behind a Citrix presentation server.
Two researchers demonstrate how unprotected, public VoIP phones could expose the internal network of a company or organization.
Solving a puzzle gets you a T-Shirt. Handing in your business card may get you a call from a recruiter.
Researchers show how objects with multimedia attributes within Second Life can unleash malware on unsuspecting users.
Researcher who found vulnerabilities in California's e-voting systems looks ahead to better auditing.
Patches address vulnerabilities in the Cisco Voice Portal and Secure Shell server (SSH) implementations.
Veracode researcher demonstrates spyware that allows someone to steal a stranger's contact list, read text messages in real time, and track the location of the phone.
Printed voting audits may help to detect fraud--unless the vendor offers a good excuse.
Under fire for New Jersey vote discrepancies and legal threats against electronic voting systems researchers, the Sequoia Voting Systems blot site went dark Thursday.