DARPA staged the world's first live computer-versus-computer hacking competition in which teams battled for a multimillion dollar purse in front of thousands of cheering fans in Las Vegas.
Cybersecurity researcher Marc Rogers is the principal hacking consultant on the hit TV show "Mr. Robot," which debuts its second season on the USA Network Wednesday.
Artist and researcher Adam Harvey has set out to raise awareness about the increasing pervasiveness of biometric tracking on the web and in everyday life.
As companies try to balance the need to be transparent with outside researchers while protecting their own sensitive business information, the often opaque bug valuation process can be controversial.
The firm MedSec went to an investment advisory firm instead of medical device maker St. Jude to disclose potential security vulnerabilities.
Hackers hunt for them and governments around the world use them to carry out spy operations. What are zero-days and why are they increasingly valuable?
Russian state-supported media is using the Democratic National Committee leaked emails to portray the American presidential elections as a corrupt spectacle akin to 'House of Cards.'
Reports that unknown hackers targeted the Moscow bureau of The New York Times is part of a worrying trend of alleged Kremlin spying against journalists in Russia.
Following European terror attacks, German officials have suggested legislation that would force tech companies to decrypt private messages and other measures to increase digital surveillance.
Many cybersecurity experts say the Kremlin is attempting to manipulate debate in the US by leaking secret information on politicians and secret government operations.
The National Security Agency stockpiled sophisticated tools designed to penetrate commonly used security software. Now that hackers have revealed some of those techniques, companies are left scrambling to secure their systems.
Can you hack a Gibson? Are you interested in SETEC Astronomy? Shall we play a game?
A potentially damaging hacking tool revealed in the apparent National Security Agency breach includes a zero-day vulnerability – or previously unknown security hole – in Cisco software. The government should have already disclosed that flaw.
A previously unknown group dumped a cache of hacking tools on the web that appear to be from the National Security Agency. Now, cybersecurity experts say Moscow is once again behind a cyberattack on the US.
The Democratic and Republican parties – and their presidential candidates – should immediately put someone in charge of safeguarding their data. It's for the good of voter privacy and American democracy.
It's the physical manifestation of what they often try and accomplish in the digital world, say lock-picking enthusiasts.
In this episode of The Cybersecurity Podcast, a team of student hackers from the University of Central Florida explain how they've managed to win three consecutive titles in the National Collegiate Cyber Defense Competition.
From Apple to Airbnb, companies are increasingly turning to outside hackers to find – and eventually fix – their software security vulnerabilities.
Microsoft apparently released a set of security protocols for unlocking security protections that could allow attackers to install malicious software on the company's smartphones and tablets.
At an Atlantic Council event this week, cybersecurity researchers and experts said last week's Black Hat and DEF CON conferences showed that Washington is working harder to build better relations with the hacker community.
Cybersecurity expert Chris Rock researched ways to overthrow a government using only his computer for a talk at the DEF CON hacker conference in Las Vegas – and he says there are some lessons for the US elections.