Reverse engineering to find the root cause of vulnerabilities can be a frustrating task, but even the analyses that go wrong can produce lessons and new skills.
Dennis Fisher is joined by Brian Donohue, Chris Brook, and Mike Mimoso to discuss the experience of watching the Black Hat talks online this year and what progress the industry has made in keeping people secure.
Adoption of DNS over HTTPS (DoH) continues to rise, but so do concerns about network visibility and centralization of DNS services.
Security researchers have demonstrated in the past how implanted medical devices such as insulin pumps and pacemakers can be compromised. A team from Virginia Polytechnic Institute and State University investigated how these devices could be used to compromise secure facilities used to work on classified information.
Dennis Fisher, Zoe Lindsey, and Pete Baker got tired of waiting for Hollywood to make sequels to some of our favorite hacker movies, so we came up with some pitches for the sequels we'd like to see.
The US government has published a detailed analysis of the Taidoor trojan it says is used by the Chinese government in network compromises.
A group of Congressional lawmakers urged the Federal Trade Commission to investigate ad-tech companies and data brokers who collect and sell consumers’ personal information.
The shift from payment cards with magnetic stripes to EMV chips was supposed to stomp out card cloning, except cybercriminals appear to have figured out a workaround.
Microsoft strikes another nail in the SHA-1 coffin with the announcement that all updates that had been signed using SHA-1 hash will be removed from the Microsoft Download Center.
A buffer overflow (CVE-2020-10713) in the GRUB 2 boot loader can allow an attacker to gain code execution on many Linux systems and possibly some Windows computers.
Decipher editors Fahmida Y. Rashid and Dennis Fisher are joined by a panel of security experts to discuss the evolution of ransomware attacks and how groups are now focusing on enterprise targets.
The Federal Bureau of Investigation warned in a “private industry notification” last week that attackers are increasingly using amplification techniques in distributed denial-of-service attacks. There has been an uptick in attack attempts since February, the agency’s Cyber Division said in the alert.
The EARN IT Act would create a flood of state laws regulating Internet use and curtail the use of encrypted services, Sen. Ron Wyden says.
A malware framework known as MATA that targets Windows, Linux, and macOS machines has been attributed to the Lazarus group tied to North Korea.
Katie Moussouris, hacker and CEO of Luta Security, joins Dennis Fisher for a long overdue conversation about vulnerability management, bug bounty programs, and assessing risk.