2018 in cybersecurity: Regrets, we have a few

This was the year security slips, privacy fails and outright stupidity went from bad to surreal. It was a year in which warnings went unheeded and companies lost whatever trust we gave them. It was a nesting doll of security disasters. A clown car of...

Voting machines are still plagued with vulnerabilities as midterms loom

The Def Con Voting Village, which for two years in a row has let conference attendees try their hand at breaching voting machines, has released the report on this year's event. More than 30 voting machines and other pieces of election equipment were...

New lawsuit shows your phone is unsafe at American borders

A recent case filed in federal court, where an American woman had her iPhone sized and cracked by Customs and Border Protection in a New Jersey airport, puts a whole new spin on the things we now need to worry about when leaving the country. It appea...

This cute Def Con badge beckons you to hack it

At previous Def Cons I wrote about the unofficial badges and the culture surrounding those pieces of technology. This year I was determined to move past my infatuation with blinking lights and colorful PCBs (printed circuit boards). Then I saw the Ma...

Dozens of kids hack election site replicas in just minutes

The Def Con hacker conference has been demonstrating how vulnerable voting machines are to hacks through its Voting Village, wherein adults are given the chance to compromise various models of voting devices. But this year, Def Con also let kids get...

Android exploit targeted apps’ shoddy use of external storage

Many mobile security flaws revolve around obvious avenues like websites or deep, operating system-level exploits. The security team at Check Point, however, has discovered another path: apps that make poor use of external storage like SD cards. Whi...

Machine learning can ‘fingerprint’ programmers

Programmers tend to have their own distinct styles, but it's not really feasible to pore over many lines of code looking for telltale cues about a program's author. Now, that might not be necessary. Researchers have developed a machine learning syste...

When your Uber driver is a spy

Like other migrating beasts, hackers travel huge distances for feeding, breeding, and breaking things every summer -- at Defcon in Las Vegas. The way they move about the city is driven primarily by the availability of free booze at corporate parties...