Session shows how researchers found multiple vulnerability in Canon firmware that can be used in a malware attack.
Dozens of insecure drivers from 20 vendors illustrate widespread weaknesses when it comes to kernel protection.
Researchers exploit a SQLite memory corruption issue outside of a browser.
Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks.
Researchers developed an exploit that allowed them to perform an array of malicious functions against so called "mobile keys".
The bug exists in a controller that oversees HVAC, lighting, sensor and alarm systems, to name a few.
Researchers show how they hacked Google Home smart speakers using the Megellan vulnerability.
From insecure voting machines to social media misinformation, governments have alot to think about when it comes to securing elections.
Apple is opening its once-private bug bounty program to all researchers, as well as boosting vulnerability payouts and expanding the product scope to include MacOS.
The insurance giant serves at least 83 million U.S. households.