Two researchers demonstrate how unprotected, public VoIP phones could expose the internal network of a company or organization.
Solving a puzzle gets you a T-Shirt. Handing in your business card may get you a call from a recruiter.
Researchers show how objects with multimedia attributes within Second Life can unleash malware on unsuspecting users.
Researcher who found vulnerabilities in California's e-voting systems looks ahead to better auditing.
Patches address vulnerabilities in the Cisco Voice Portal and Secure Shell server (SSH) implementations.
A researcher at ShmooCon demonstrates how browser hot keys can expose the internal network running behind a Citrix presentation server.
Veracode researcher demonstrates spyware that allows someone to steal a stranger's contact list, read text messages in real time, and track the location of the phone.
Printed voting audits may help to detect fraud--unless the vendor offers a good excuse.
Under fire for New Jersey vote discrepancies and legal threats against electronic voting systems researchers, the Sequoia Voting Systems blot site went dark Thursday.
Users should not use their browser until a patch for a security hole is made available, a security researcher says.