Every Week Is Shark Week in Cyberspace Your data, identities, and credentials are cyber chum. Here's how to protect yourself from the feeding frenzy.
The ABCs of Hacking a Voting Machine A hacker who successfully infiltrated a voting machine at last year's DEF CON will demonstrate at Black Hat USA how he did it, as well as what he later found stored on other decommissioned WinVote machines.
New Spectre Variant Hits the Network A new proof of concept is a reminder that complex systems can be vulnerable at the most basic level.