Participants of the Pwn2Own software exploitation conference hacked technology from automaker Tesla twice at the Zero Day Initiative's Pwn2Own software exploitation...PC Magazine From ACM TechNews | March 29, 2023
Polish security researcher Dawid Potocki discovered a vulnerability in MSI's motherboards that occurs when the Secure Boot default settings for "Image Execution...PC Magazine From ACM TechNews | January 24, 2023
Mordechai Guri at Israel's Ben-Gurion University of the Negev transmitted stolen data from a personal computer by manipulating the device's power supply.
PC Magazine From ACM TechNews | December 14, 2022
Google Project Zero security researcher Ivan Fratric launched a remote code execution attack by exploiting the technology underlying Zoom and other applications...PC Magazine From ACM TechNews | August 15, 2022
An FBI public advisory warns about an increase in scammers using deepfake technology and stolen personal identifying information (PII) to impersonate job candidates...PC Magazine From ACM TechNews | July 7, 2022