The ABCs of Hacking a Voting Machine A hacker who successfully infiltrated a voting machine at last year's DEF CON will demonstrate at Black Hat USA how he did it, as well as what he later found stored on other decommissioned WinVote machines.
US-CERT Warns of ERP Application Hacking ERP applications such as Oracle and SAP's are open to exploit and under attack, according to a new report referenced in a US-CERT warning.
Iranian Hacker Group Waging Widespread Espionage Campaign in Middle East Unlike other threat actors that have a narrow set of targets, Leafminer has over 800 organizations in its sights, Symantec says.
Securing Our Interconnected Infrastructure A little over a year ago, the world witnessed NotPetya, the most destructive cyberattack to date. What have we learned?
Google Security Updates Include Titan Hardware Key At Next 2018, Google also launches context-aware access management, shielded VMs, and G Suite security center investigation tool.
'Password Check Required'? Not So Fast The most successful phishing emails tell users to check their passwords or investigate security alerts.
Google Calls Out Insecure Sites in New Chrome Version The latest version of the Chrome browser puts a label on unencrypted websites.