The next time your phone battery is getting low in public and you need to give it a boost, think twice about using that charging station-it could lead to a serious breach of security. This is due to a ...
In theory, writing a Linux device driver shouldn’t be that hard, but it is harder than it looks. However, using libusb, you can easily deal with USB devices from user space, which, for many purposes, ...
A security researcher has worked out how to hack a proprietary USB-C controller used by Apple, an issue that could eventually lead to new iPhone jailbreaks and other security problems. As one of the ...
Serbian authorities have reportedly used an Android zero-day exploit chain developed by Cellebrite to unlock the device of a student activist in the country and attempt to install spyware. Cellebrite ...
Cybersecurity is often described as a cat-and-mouse game between defenders and attackers. Defenders work on protecting systems by patching vulnerabilities through research and development, while ...