AuthorKelly Jackson Higgins Executive Editor at Dark Reading

Election Websites, Backend Systems Most at Risk of Cyberattack in Midterms

Both adult and kid hackers demonstrated at DEF CON how the hackable voting machine may be the least of our worries in the 2018 elections.

Election Websites, Backend Systems Most at Risk of Cyberattack in Midterms

Both adult and kid hackers demonstrated at DEF CON how the hackable voting machine may be the least of our worries in the 2018 elections.

‘Hack the Marine Corps’ Bug Bounty Event Held in Vegas

$80K in payouts went to hand-picked hackers in nine-hour event during DEF CON in Las Vegas.

IoT Malware Discovered Trying to Attack Satellite Systems of Airplanes, Ships

Researcher Ruben Santamarta shared the details of his successful hack of an in-flight airplane Wi-Fi network - and other findings - at Black Hat USA today.

No, The Mafia Doesn’t Own Cybercrime: Study

Organized crime does, however, sometimes provide money-laundering and other expertise to cybercriminals.

Researchers Release Free TRITON/TRISIS Malware Detection Tools

Team of experts re-creates the TRITON/TRISIS attack to better understand the epic hack of an energy plant that ultimately failed.

HP Launches Printer Bug Bounty Program

Bugcrowd will manage new vulnerability disclosure award program for HP enterprise printers.

HP Launches Printer Bug Bounty Program

Bugcrowd will manage new vulnerability disclosure award program for HP enterprise printers.

The ABCs of Hacking a Voting Machine

A hacker who successfully infiltrated a voting machine at last year's DEF CON will demonstrate at Black Hat USA how he did it, as well as what he later found stored on other decommissioned WinVote machines.

The ABCs of Hacking a Voting Machine

A hacker who successfully infiltrated a voting machine at last year's DEF CON will demonstrate at Black Hat USA how he did it, as well as what he later found stored on other decommissioned WinVote machines.