From discovering a real-life line hack to spinning on my head, my first visit to the Black Hat and Defcon security conferences was wild.
Following a report that some Blu phones use an app that collects your data, Amazon has made them unavailable on its site.
Voting is at the foundation of every democracy. Hackers find it's on shaky ground thanks to shoddy technology.
The Armatix IP1 smart gun is one of the few connected pistols available. It’s also easy to hack.
Who hacks the hackers? An inside look at hunting for insecure connections at the largest cybersecurity gathering in the world.
As the Defcon hacker convention kicks off, vandalism that looked like a hack popped up on Wet Republic's website. It was just an ad.
Michael Daniel spent four years working on cybersecurity for the White House. But he knows there's much more to be done.
If your phone doesn't have the latest update, leaving your Wi-Fi open might let hackers take over your device.
There are calls and text messages coming from your phone number that you never made. Meet the “ghost telephonist.”
They explain to a Black Hat panel how a small flaw near an ATM's speakers let them turn the machine into a cash fountain.
The criminal operators are acting like legitimate firms, offering support services and even hiring graphic designers, researchers tell a Black Hat panel.
How much do you value your privacy and security? Researchers at Black Hat found a series of phones that are secretly sending data to Chinese servers.