Security researchers have demonstrated how it is possible to use stickers to get computer vision systems in autonomous vehicles to wrongly identify signs.
Many companies have adopted the practice of recruiting a team of hackers to poke holes in their networks and assess their incident response capabilities.
Security researchers linked three cyber espionage campaigns to a group that exploits leaked Hacking Team tools and flaws in outdated software.
An 11-year-old boy used a clever Bluetooth hack to control his teddy bear and demonstrate that not even connected toys are immune to IoT security risks.
A recent Apple patch update addressed critical vulnerabilities discovered by contestants at this year's Pwn2Own hacking competition.
On April 10, Sierra Tel discovered that its IoT device modems had been bricked, possibly by a vigilante trying to neutralize rogue devices.
Hajime appears to have been created by a vigilante that is attempting to improve IoT device security and help IT decision-makers tighten defenses.
Hacked site numbers continue to increase, according to Google. Businesses must take steps to ensure their online properties are safe and secure.
Bug bounty programs are now paying out more to white-hat hackers, but they're also tightening regulations on payments and structure.
The classic image of the Hollywood hacker is misleading. The typical cybercriminal is more likely to be a state-sponsored actor or malicious insider.