In its inaugural contest, the Tianfu Cup produced an iPhone hack that was allegedly used to spy on China’s Uyghur minority.
When is it okay for the government to keep a secret?
sharpshutter via shutterstock.com
What’s the best way for spy agencies to protect the public: secretly exploit software flaws to gather intelligence, or warn the world and avert malicious cyberattacks?
Apple didn’t know about the vulnerability until the iPhone hack.
Rich rewards are on offer to people who can help private companies develop software to exploit vulnerabilities in technology such as smartphones. It might be legal but is it ethical?
The attacker may already be inside.
Computer user image via shutterstock.com
Breaches of confidential information are inevitable. But we can limit their size and scope, and therefore their damage.
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it.
Midnight via www.shutterstock.com
“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…