In light of new memory safety features added to Apple’s latest iPhone chips that make entire classes of exploits harder to pull off, the company has revamped its bug bounty program to double or ...
Publicly released exploit code for an effectively unpatched vulnerability that gives root access to virtually all releases of ...
Might one silicon-level change render top-of-the-line spyware so costly to construct? Apple is wagering that it might, with its iPhone 17. Apple’s new Memory Integrity Enforcement (MIE) system, which ...
Given that it's the most widely-used web browser on the market, Google Chrome has had a target on its back for some time. Because of that, Google is always tinkering with security to stay ahead of ...
A new speculative execution attack named "TIKTAG" targets ARM's Memory Tagging Extension (MTE) to leak data with over a 95% chance of success, allowing hackers to bypass the security feature. The ...
Qualcomm chips found in Samsung, Motorola, OnePlus, and more brands’ phones could have been exploited, but we don’t know to what extent. Reading time 2 minutes Qualcomm offered a few sparse details ...
A new iOS exploit chain is being used by attackers around the globe, and it's built for espionage actors and financially motivated attackers alike. Google, iVerify, and Lookout this week published ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results