All articles
-
Hackers steal Pfizer/BioNTech COVID-19 vaccine data in Europe, companies say Dec 10, 2020
-
iPhone zero-click Wi-Fi exploit is one of the most breathtaking hacks ever Dec 2, 2020
-
179 Arrested in Massive Global Dark Web Takedown Nov 11, 2020
-
FBI: Hackers stole source code from US government agencies and private companies Nov 8, 2020
-
Company forced to change name that could be used to hack websites Nov 7, 2020
-
Fault in NHS Covid app meant thousands at risk did not quarantine Nov 3, 2020
-
Hacked Billboards Can Make Teslas See ‘Phantom Objects,’ Causing Them to Swerve or Stop Abruptly Oct 16, 2020
-
FritzFrog: A New Generation of Peer-to-Peer Botnets written in Go Sep 25, 2020
-
Attack of the week: Voice calls in LTE Sep 25, 2020
-
UK Firms pay £200m in ransoms to hackers Sep 25, 2020
-
CrimeOps: The Operational Art of Cyber Crime Sep 25, 2020
-
Spammers use hexadecimal IP addresses to evade detection Sep 25, 2020
-
The iOS 14 Privacy and Security Features You Should Know Sep 25, 2020
-
Consultants charged for bribing Amazon Marketplace employees to game the platform Sep 25, 2020
-
A Patient Dies After Ransomware Attack Paralyzes German Hospital Systems Sep 25, 2020
-
Intel NDA blueprints – 20GB of source code, schematics, specs, docs – spill onto web from partners-only vault Aug 7, 2020
-
Hackers Tell the Story of the Twitter Attack From the Inside Jul 18, 2020
-
Senate Intelligence Committee Confirms the US Navy Has a UFO Task Force Jun 28, 2020
-
Crooks hide e-skimmer code in favicon EXIF Metadata Jun 28, 2020
-
ISIS Affiliated News Site Stops Accepting Bitcoin, Moves To Monero Jun 25, 2020
-
Almost 1 in 3 pilots in Pakistan have fake licenses, aviation minister says Jun 25, 2020
-
Amazon says it mitigated the largest DDoS attack ever recorded Jun 25, 2020
-
Privacy-Focused OS Wants to Know How Facebook and the FBI Hacked it Jun 24, 2020
-
Facebook Helped the FBI Hack a Child Predator Jun 24, 2020
-
Why the NHS Covid-19 contact tracing app failed Jun 24, 2020
-
BlueLeaks: Data from 200 US police departments & fusion centers published online Jun 22, 2020
-
Honda pauses production and closes offices following ransomware attack Jun 10, 2020
-
Honda’s global operations hit by production impacting cyber-attack Jun 10, 2020
-
eBay-like auction site created for stolen data Jun 9, 2020
-
Wallpaper image crashing Android phones Jun 9, 2020
-
Romanian Skimmer Gang in Mexico Stole $1.2 Billion Jun 9, 2020
-
Google Faces Privacy Lawsuit Over Tracking Users in Incognito Mode Jun 9, 2020
-
U.S. Nuclear Contractor Hit with Maze Ransomware, Data Leaked Jun 9, 2020
-
Critical flaw could have allowed attackers to control traffic lights Jun 9, 2020
-
Google’s indexing of WhatsApp numbers raises privacy concerns Jun 9, 2020
-
The $100,000 bug in Sign in with Apple May 31, 2020
-
$350 USB Stick That Claims to Block 5G Is Actually a $6 Generic Thumb Drive May 29, 2020
-
eBay port scans visitors’ computers for remote access programs May 25, 2020
-
Police in China, Dubai, and Italy are using these surveillance helmets to scan people for COVID-19 fever as they walk past and it may be our future normal May 17, 2020
-
Malicious tweets targeting epilepsy charity trigger seizures May 16, 2020
-
Huge, mysterious list appears online of where people met, personal information and more of tens of millions May 15, 2020
-
Mitch McConnell is pushing the Senate to pass a measure that would let the FBI collect Americans’ web-browsing history without a warrant May 14, 2020
-
The Original Cookie specification from 1997 was GDPR compliant May 8, 2020
-
For 8 years, a hacker operated a massive IoT botnet just to download Anime videos May 8, 2020
-
Samsung patches 0-click vulnerability impacting all smartphones sold since 2014 May 7, 2020
-
New Firefox service will generate unique email aliases to enter in online forms May 7, 2020
-
Trump bans acquisition of foreign power grid equipment, citing hacking threats May 6, 2020
-
Spyware slinger NSO to Facebook: Pretty funny you’re suing us in California when we have no US presence and use no American IT services May 6, 2020
-
The security behind the NHS contact tracing app May 6, 2020
-
Tesla has been getting rid of computers without wiping them May 6, 2020
-
Apple’s Copyright Lawsuit Has Created a ‘Chilling Effect’ on Security Research May 6, 2020
-
Children’s computer game Roblox employee bribed by hacker for access to millions of users’ data May 6, 2020
-
Missourians who tipped off county about lockdown rule-breakers fear retaliation after detail release May 4, 2020
-
Prisons Replace Ankle Bracelets With An Expensive Smartphone App That Doesn’t Work May 2, 2020
-
ICANN finally halts $1.1bn sale of .org registry, says it’s ‘the right thing to do’ after months of controversy May 1, 2020
-
How Spies Snuck Malware Into the Google Play Store Apr 30, 2020
-
Coronavirus app: will Australians trust a government with a history of tech fails and data breaches? Apr 27, 2020
-
RIPE opposes China’s internet protocols upgrade plan Apr 26, 2020
-
Amazon-owned Whole Foods is quietly tracking its employees with a heat map tool that ranks which stores are most at risk of unionizing Apr 21, 2020
-
We Mapped How the Coronavirus Is Driving New Surveillance Programs Around the World Apr 17, 2020
-
Phish of GoDaddy Employee Jeopardized Escrow.com, Among Others Apr 17, 2020
-
Alleged Zoom Zero-Days for Windows, MacOS for Sale Apr 17, 2020
-
Pastebin Made It Harder To Scrape Its Site And Researchers Are Pissed Off Apr 17, 2020
-
Academics steal data from air-gapped systems using PC fan vibrations Apr 17, 2020
-
Europe publishes draft rules for coronavirus contact-tracing app development Apr 17, 2020
-
The ancient computers in the Boeing 737 Max are holding up a fix Apr 16, 2020
-
Former Tesla employees brought stolen documents to self-driving startup Zoox Apr 16, 2020
-
Ransomware leak Boeing, Lockheed Martin, SpaceX documents after contractor refuses to pay Apr 14, 2020
-
How Apple and Google Are Enabling Covid-19 Bluetooth Contact Apr 13, 2020
-
We Saw NSO’s Covid-19 Software in Action, and Privacy Experts Are Worried Apr 11, 2020
-
PayPal and Venmo Are Letting SIM Swappers Hijack Accounts Apr 11, 2020
-
Emotet Took Down a Network by Overheating All Computers Apr 11, 2020
-
How xHelper Android Malware Re-Installs Even After Factory Reset Apr 11, 2020
-
Disease Surveillance and the Fourth Amendment Apr 11, 2020
-
Google backs Apple’s SMS OTP standard proposal Apr 11, 2020
-
Fingerprint cloning: Myth or reality? Apr 11, 2020
-
Microsoft Buys Corp.com So Bad Guys Can’t Apr 11, 2020
-
Dangerous Domain Corp.com Goes Up for Sale Apr 11, 2020
-
Cloudflare Axes Google reCAPTCHA Due to Privacy, Price Apr 11, 2020
-
YouTube borked when users enable Firefox anti-fingerprinting Apr 11, 2020
-
Google and Apple Plan to Turn Smartphones into Coronavirus Contact-Tracking Devices Apr 11, 2020
-
Zoom banned from New York City schools due to privacy, security flaws Apr 5, 2020
-
Facebook tried to buy NSO Group’s iOS spyware to monitor iPhone users Apr 3, 2020
-
Boeing 787s must be turned off and on every 51 days to prevent ‘misleading data’ being shown to pilots Apr 3, 2020
-
A New York Power Plant Is Mining $50K Worth of Bitcoin a Day Mar 22, 2020
-
Google Says It Doesn’t ‘Sell’ Your Data. Here’s How the Company Shares, Monetizes, and Exploits It. Mar 20, 2020
-
TikTok instructed moderators to suppress posts by ‘ugly’ and poor users Mar 19, 2020
-
Senate bill would ban TikTok from government phones Mar 19, 2020
-
Working From Home? Zoom Tells Your Boss If You’re Not Paying Attention Mar 19, 2020
-
Europol busts up two SIM-swapping hacking rings Mar 19, 2020
-
Researchers Uncover a Nigerian Hacker’s Pursuit of his Million Dollar Dream Mar 19, 2020
-
iPhone Unlocking Tech GrayKey Went Up in Price Because Hacking iPhones Got Harder Mar 19, 2020
-
WordPress and Apache Struts account for 55% of all weaponized vulnerabilities Mar 19, 2020
-
Hospitals Need to Repair Ventilators. Manufacturers Are Making That Impossible Mar 19, 2020
-
The Facebook Container for Firefox Mar 15, 2020
-
US Army scraps $1b. Iron Dome project, after Israel refuses to provide source code Mar 8, 2020
-
The Case for Limiting Your Browser Extensions Mar 6, 2020
-
Top 10 Most Innovative Cybersecurity Companies After RSA 2020 Mar 6, 2020
-
Alleged Vault 7 leaker trial finale: Want to know the CIA’s password for its top-secret hacking tools? 123ABCdef Mar 6, 2020
-
Hackers Can Clone Millions of Toyota, Hyundai, and Kia Keys Mar 6, 2020
-
Let’s Encrypt: OK, maybe nuking three million HTTPS certs at once was a tad ambitious. Let’s take time out Mar 6, 2020
-
Let’s Encrypt to revoke 3 million certificates on March 4 due to software bug Mar 4, 2020
-
Eric Schmidt: I Used to Run Google. Silicon Valley Could Lose to China. Mar 3, 2020
-
Scientist sentenced to 2 years behind bars for stealing next-generation battery tech secrets Mar 3, 2020
-
Here’s the File Clearview AI Has Been Keeping on Me, and Probably on You Too Mar 3, 2020
-
$1B to help telecom carriers to “rip and replace” Huawei and ZTE equipment Mar 3, 2020
-
Swiss government submits criminal complaint over CIA Crypto spying scandal Mar 3, 2020
-
Hackers Can Use Ultrasonic Waves to Secretly Control Voice Assistant Devices Mar 3, 2020
-
Project Rubicon: The NSA Secretly Sold Flawed Encryption for Decades Mar 3, 2020
-
Karkoff 2020: a new APT34 espionage operation involves Lebanon Government Mar 3, 2020
-
Coder charged in massive CIA leak portrayed as vindictive Mar 3, 2020
-
Apple reportedly ditched plan for encrypted iCloud backup after FBI pressure Mar 2, 2020
-
Pen Testing Ships Mar 1, 2020
-
Facial recognition company Clearview AI hit by data theft Feb 29, 2020
-
FBI Says $140+ Million Paid to Ransomware Feb 29, 2020
-
Clearview AI loses entire database of faceprint-buying clients to hackers Feb 29, 2020
-
FBI recommends using passphrases instead of complex passwords Feb 29, 2020
-
European Commission has chosen the Signal app to secure its communications Feb 29, 2020
-
Zyxel 0day Affects its Firewall Products, Too Feb 29, 2020
-
123 Million Records Leaked by Decathlon Feb 29, 2020
-
Kr00k Wi-Fi Encryption flaw affects more than a billion devices Feb 29, 2020
-
After blowing $100m to snoop on Americans’ phone call logs for four years, what did the NSA get? Just one lead Feb 29, 2020
-
Android malware can steal Google Authenticator 2FA codes Feb 27, 2020
-
Amazon engineer calls for Ring to be ‘shut down immediately’ over privacy concerns Feb 24, 2020
-
Wells Fargo to pay $3 billion over fake account scandal Feb 24, 2020
-
These Guys Figured Out a Way to Get Endless Free McDonald’s Feb 21, 2020
-
Leaked Document Shows How Big Companies Buy Credit Card Data on Millions of Americans Feb 21, 2020
-
Big Telecom Say It Has First Amendment Right to Sell Your Private Data Feb 21, 2020
-
MGM Hotel Hack Leaves 10.6M Guests’ Personal Data Exposed Feb 21, 2020
-
Google to Samsung: Stop messing with Linux kernel code. It’s hurting Android security Feb 17, 2020
-
We keep falling for phishing emails, and Google just revealed why Feb 8, 2020
-
How an Amazon Engineer Exposed Credentials Jan 24, 2020
-
Rogue NYPD cops are using facial recognition app Clearview Jan 24, 2020
-
WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation Jan 23, 2020
-
Here Is the Technical Report Suggesting Saudi Arabia’s Prince Hacked Jeff Bezos’s Phone Jan 23, 2020
-
Who Made the Spyware Used to Hack Jeff Bezos’ Phone? Jan 23, 2020
-
A timeline of events surrounding the Bezos phone hack Jan 23, 2020
-
The Secretive Company That Might End Privacy as We Know It Jan 19, 2020
-
Google will now accept your iPhone as an authentication key Jan 19, 2020
-
Chinese police arrested the operator of unauthorized VPN service that made $1.6 million from his activity Jan 18, 2020
-
Iran vs U.S., The Cyber Front Explained Jan 18, 2020
-
Students Are Campaigning To Ban Facial Recognition From College Campuses Jan 15, 2020
-
5G Security Jan 15, 2020
-
Mobile carriers are still vulnerable to SIM swapping attacks Jan 15, 2020
-
US officials pressure UK on abandoning Huawei Jan 15, 2020
-
Nasty PHP7 remote code execution bug exploited in the wild Oct 28, 2019
-
Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer Oct 5, 2019
-
The year-long rash of supply chain attacks against open source is getting worse Oct 5, 2019
-
We Cannot Afford to Lose the Digital Revolution. Oct 5, 2019
-
Hamstrung by ransomware, 10 hospitals are turning away some patients Oct 5, 2019
-
Google launches Incognito Mode for Google Maps, and more Oct 5, 2019
-
Russian state hackers rarely share code with one another Oct 5, 2019
-
Binary Hardening in IoT products Oct 5, 2019
-
Attackers exploit 0-day vulnerability that gives full control of Android phones Oct 5, 2019
-
France and Germany agree to block Facebook’s Libra Sep 14, 2019
-
NY Payroll Company Vanishes With $35 Million Sep 14, 2019
-
SimJacker attack allows hacking any phone with just an SMS Sep 14, 2019
-
Israel accused of planting mysterious spy devices near the White House Sep 14, 2019
-
Russian Hackers Behind Ukraine Power Outage May Have Sought More Damage Sep 14, 2019
-
France to block Facebook’s Libra cryptocurrency in Europe Sep 14, 2019
-
AWS power outage with data loss Sep 8, 2019
-
CVE-2019-15846 Exim mail server flaw allows Remote Code Execution as root Sep 8, 2019
-
Backdoor code found in 11 Ruby libraries Sep 8, 2019
-
Backdoor discovered in Ruby strong_password library Sep 8, 2019
-
Malicious attack on Wikipedia Sep 7, 2019
-
Scammer Successfully Deepfaked CEO’s Voice To Fool Underling Into Transferring $243,000 Sep 4, 2019
-
Dept. of Homeland Security Forced to Release List of Keywords Used to Monitor Social Networking Sites Sep 4, 2019
-
Interview with CEO of Israeli spyware-maker NSO Aug 18, 2019
-
How Gmail’s AI used to deactivate any Gmail account Aug 18, 2019
-
Hackers Can Turn Everyday Speakers Into Acoustic Cyberweapons Aug 17, 2019
-
Canon DSLR Cameras Can Be Hacked With Ransomware Remotely Aug 17, 2019
-
High-security locks for government and banks hacked by researcher Aug 17, 2019
-
Zoncolan: How Facebook uses static analysis to detect and prevent security issues Aug 17, 2019
-
Huawei Firmware Analysis Reveals Security Problems Aug 17, 2019
-
These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer Aug 11, 2019
-
New advanced malware, possibly nation sponsored, is targeting US utilities Aug 4, 2019
-
US Cities Are Helping People Buy Amazon Surveillance Cameras Using Taxpayer Money Aug 4, 2019
-
A Military Contractor Is Flying Spy Balloons High Over the Midwest Aug 4, 2019
-
New Dragonblood vulnerabilities found in WiFi WPA3 standard Aug 4, 2019
-
GitHub sued for aiding hacking in Capital One breach Aug 4, 2019
-
Researchers Discover New Ways to Hack WPA3 Protected WiFi Passwords Aug 4, 2019
-
5G Is Here—and Still Vulnerable to Stingray Surveillance Aug 4, 2019
-
Unplugging From Digital Controls to Safeguard Power Grids Aug 4, 2019
-
Cybersecurity in the Automotive Industry Aug 3, 2019
-
Zoncolan: How Facebook uses static analysis to detect and prevent security issues Aug 3, 2019
-
Amazon allegedly scammed out of $370K by 22-year-old’s return shipments of dirt Aug 3, 2019
-
A Technical Analysis of the Capital One Hack Aug 3, 2019
-
The Technical Side of the Capital One AWS Security Breach Aug 3, 2019
-
Capital One Data Theft Impacts 106M People Aug 3, 2019
-
Russia’s Secret Intelligence Agency Hacked: ‘Largest Data Breach In Its History’ Jul 21, 2019
-
Amazon confirms it keeps your Alexa recordings basically forever Jul 3, 2019
-
Kubernetes CLI tool security flaw lets attackers run code on host machine Jun 28, 2019
-
A Second U.S. City Has Banned Facial Recognition Jun 28, 2019
-
DARPA’S $1.5-Billion Remake of U.S. Electronics Jun 28, 2019
-
Key Conjurer: Our Policy of Least Privilege Jun 28, 2019
-
It’s Surprisingly Easy to Hack the Precision Time Protocol Jun 28, 2019
-
For two hours, a large chunk of European mobile traffic was rerouted through China Jun 8, 2019
-
Household Radar Can See Through Walls and Knows How You’re Feeling Jun 8, 2019
-
SEC suing Kik for unregistered ICO Jun 5, 2019
-
Advanced Linux backdoor found in the wild escaped AV detection May 31, 2019
-
Google Just Gave 2 Billion Chrome Users A Reason To Switch To Firefox May 31, 2019
-
Docker Bug Allows Root Access to Host File System May 29, 2019
-
Stolen NSA hacking tool now victimizing US cities May 26, 2019
-
First official version of Tor Browser for Android released on the Play Store May 22, 2019
-
Baltimore ransomware nightmare could last weeks more, with big consequences May 22, 2019
-
San Francisco just banned facial-recognition technology May 20, 2019
-
Google pulls Huawei’s Android license May 20, 2019
-
Google’s Sensorvault Is a Boon for Law Enforcement. This Is How It Works. May 19, 2019
-
Post-mortem and remediations for Apr 11 security incident May 19, 2019
-
A serious hack hit WhatsApp May 18, 2019
-
Google Titan Security Key Recalled After Bluetooth Pairing Bug May 18, 2019
-
Cisco Service Provider, WebEx Bugs Offer Up Remote Code Execution May 18, 2019
-
Forbes Becomes Latest Victim of Magecart Payment Card Skimmer May 18, 2019
-
Stack Overflow hacker went undetected for a week May 18, 2019
-
Chinese state-sponsored hackers breached TeamViewer in 2016 May 18, 2019
-
Alpine Linux Docker Images Shipped for 3 Years with Root Accounts Unlocked May 11, 2019
-
Cisco Talos warns of hardcoded credentials in Alpine Linux Docker Images May 11, 2019
-
How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks May 7, 2019
-
Cisco Warns of Critical Nexus 9000 Data Center Flaw May 5, 2019
-
A hacker is wiping Git repositories and asking for a ransom May 5, 2019
-
Anatomy of CVE-2019-5736: A runc container escape! May 4, 2019
-
Unauthorized access to Docker Hub database Apr 28, 2019
-
Ghidra: NSA’s reverse engineerin tool released to the public Mar 6, 2019
-
How the Spectre and Meltdown Hacks Really Worked Mar 2, 2019
-
New Security Technology Detects Malicious Cyberattacks on Drones, Cars, and Robots Mar 2, 2019
-
Jeff Bezos Protests the Invasion of His Privacy, as Amazon Builds a Sprawling Surveillance State for Everyone Else Feb 10, 2019
-
QuadrigaX lost $150 million in cryptocurrencies because its founder died and only he knew the wallet password. Feb 9, 2019
-
Hundreds of Bounty Hunters Had Access to AT&T, T-Mobile, and Sprint Customer Location Data for Years Feb 9, 2019
-
Open sourcing ClusterFuzz Feb 9, 2019
-
The Big DNS Privacy Debate at FOSDEM Feb 8, 2019
-
A Scammer Used YouTube’s Copyright System to Ransom Creators Feb 8, 2019
-
Mayhem, the Machine That Finds Software Vulnerabilities, Then Patches Them Feb 2, 2019
-
Who Controls Bitcoin Core? Jan 29, 2019
-
Leaked Documents Show How Instagram Polices Stories Jan 27, 2019
-
China’s APT10 Jan 27, 2019
-
Hackers bypassed vein based authentication with a fake hand Jan 27, 2019
-
NSA to release a free reverse engineering tool Jan 7, 2019
-
PNC Bank testing dynamic CVV codes to combat online card fraud Dec 29, 2018
-
Logitech Keystroke Injection Flaw Went Unaddressed for Months Dec 15, 2018
-
Critical SQLite Flaw Leaves Millions of Apps Vulnerable to Hackers Dec 15, 2018
-
Google+ bug exposes non-public profile data for 52 million users Dec 10, 2018
-
Millions of smartphones were taken offline by an expired certificate Dec 9, 2018
-
Bitcoin Options Bought for $1 Million Will Soon Be Worthless Dec 9, 2018
-
Malicious sites abuse 11-year-old Firefox bug that Mozilla failed to fix Dec 9, 2018
-
The biggest crypto programming errors of all time Dec 9, 2018
-
Confidential transactions have arrived, a dive into the AZTEC Protocol Dec 8, 2018
-
How Criminals Steal $37 Billion a Year from America’s Elderly Dec 8, 2018
-
Kubernetes’ first major security hole discovered Dec 4, 2018
-
How I Dumped eBay Japan’s Website Source Code Nov 29, 2018
-
The FBI Created a Fake FedEx Website to Unmask a Cybercriminal Nov 28, 2018
-
Why x86 won’t survive Nov 28, 2018
-
Secret Service cracks down on credit card skimming at gas pumps nationwide Nov 24, 2018
-
Google is tracking you. Even when you’re in Airplane Mode Nov 23, 2018
-
German eID Authentication Flaw Lets You Change Identity Nov 22, 2018
-
CDC: Outbreak of E. coli Infections Linked to Romaine Lettuce Nov 21, 2018
-
France is ditching Google to reclaim its online independence Nov 20, 2018
-
The dark side of YouTube Nov 19, 2018
-
Hacker Say They Compromised ProtonMail. ProtonMail Says It’s BS. Nov 18, 2018
-
‘Crypto hangover’ hammers Nvidia’s outlook, shares drop 17 percent Nov 16, 2018
-
A 100,000-router botnet is feeding on a 5-year-old UPnP bug in Broadcom chips Nov 14, 2018
-
Google goes down after major BGP mishap routes traffic through China Nov 14, 2018
-
Google traffic hijacked via tiny Nigerian ISP Nov 14, 2018
-
Alarm over talks to implant UK employees with microchips Nov 12, 2018
-
Proof-of-Work and Proof-of-Stake are Regressive Nov 10, 2018
-
VirtualBox 0-day vulnerability Nov 7, 2018
-
Fake Elon Musk Twitter Bitcoin Scam Earned 180K in One Day Nov 6, 2018
-
Security professional’s toolbox: Semi-automated pentesting with open source tools Nov 5, 2018
-
Proof-of-Signature Superior to PoW and PoS Oct 31, 2018
-
China has been ‘hijacking the vital internet backbone of western countries’ Oct 27, 2018
-
With No Laws To Guide It, Here’s How Orlando Is Using Amazon’s Facial Recognition Technology Oct 27, 2018
-
Twelve malicious Python libraries found and removed from PyPI Oct 27, 2018
-
British Airways hack is worse than originally thought Oct 26, 2018
-
X.org bug that gives attackers root bites OpenBSD and other big-name OSes Oct 26, 2018
-
How China Used a Tiny Chip to Infiltrate U.S. Companies Oct 4, 2018
-
Facebook hack gets worse as company admits Instagram and other apps were exposed too Oct 1, 2018
-
Facebook says nearly 50m users compromised in huge security breach Sep 30, 2018
-
Facebook caught automatically blocking AP and Guardian stories about the theirmassive data breach Sep 29, 2018
-
Uber to pay $148 million for 2016 data breach and cover-up Sep 27, 2018
-
NSA employee who brought hacking tools home sentenced to 66 months in prison Sep 27, 2018
-
California passes nation’s first IoT security bill Sep 25, 2018
-
Bitcoin Core Developers kept a critical DoS bug, a secret; releases fix Sep 23, 2018
-
Chrome is a Google Service that happens to include a Browser Engine Sep 23, 2018
-
A perspective from the Bitcoin Cash and Bitcoin Unlimited developer who discovered CVE-2018–17144 Sep 22, 2018
-
NCIX Database Servers Sold at Craigslist Without Being Wiped Sep 21, 2018
-
Japanese crypto exchange Zaif hacked, losses in the range of $60 million reported Sep 20, 2018
-
Another Victim of the Magecart Assault Emerges: Newegg Sep 20, 2018
-
Critical Bug Found in Bitcoin Core Invokes the Multiple Client Argument Sep 19, 2018
-
EOS dApp Used Blockchain Backdoor To Remove Tokens From User’s Wallets Without Their Consent Sep 17, 2018
-
An Overview of the Different Blockchain Consensus Algorithms Sep 17, 2018
-
Open Heart Surgery: Inside Ethereum’s Crucial Replacement of the EVM Sep 17, 2018
-
Robinhood Is Making Millions Selling Out Customers to High-Frequency Traders Sep 16, 2018
-
A new CSS-based web attack will crash and restart your iPhone Sep 16, 2018
-
Google’s prototype Chinese search engine reportedly links searches to phone numbers Sep 15, 2018
-
Tesla Model 3 Stolen From Mall of America Using Only a Smartphone Sep 15, 2018
-
Almost half of US cellphone calls will be scams by next year, says report Sep 15, 2018
-
Bitmex Accused of Manipulating Ethereum’s Price Sep 12, 2018
-
In a Few Days, Credit Freezes Will Be Fee Sep 12, 2018
-
Exploit vendor drops Tor Browser zero-day on Twitter Sep 10, 2018
-
IBM secretly used New York’s CCTV cameras to train its surveillance software Sep 9, 2018
-
Proof-of-Stake is a Rebranded Version of the Old Financial System Sep 9, 2018
-
Bitcoin Gold delisted from major cryptocurrency exchange after refusing to pay hack damages Sep 5, 2018
-
Liberal Radicalism: Breaking down Buterin, Hitzig and Weyl’s paper Sep 4, 2018
-
There’s a Problem With Crypto Funding – And Vitalik Just Might Have a Solution Sep 4, 2018
-
Almost $1B in Bitcoin Moved Around in Silk Road Wallet Addresses Sep 4, 2018
-
Ethereum co-founder Vitalik Buterin speaks on ‘collapse of ETH’ Sep 4, 2018
-
New EOS Bug Steals Resources Directly From Users Aug 28, 2018
-
Debugging an evil Go runtime bug Aug 28, 2018
-
Remote Code Execution on a Facebook server Aug 25, 2018
-
Remote Code Execution on a Facebook server Aug 25, 2018
-
Florida Man Arrested in SIM Swap Conspiracy Aug 8, 2018
-
BGP / DNS Hijacks Target Payment Systems Aug 8, 2018
-
Another hack rocks cryptocurrency trading: Bancor loses $13.5 million Jul 13, 2018
-
Engineer Found Guilty for Stealing Navy Secrets via Dropbox Account Jul 13, 2018
-
Timehop security breach Jul 13, 2018
-
Compromised JavaScript Package Caught Stealing npm Credentials Jul 13, 2018
-
“Bitcoins for cash in bags” trader gets 12 months in prison Jul 13, 2018
-
Attackers could use heat traces left on keyboard to steal passwords Jul 7, 2018
-
Is the Bitcoin network an oligarchy? Jul 7, 2018
-
NSO Group Employee Allegedly Stole Company’s Powerful Spyware for Personal Profit Jul 6, 2018
-
German police raid homes of Tor-linked group’s board members Jul 6, 2018
-
Nakamoto Family Foundation Jul 3, 2018
-
DNS Poisoning or BGP Hijacking Suspected Behind Trezor Wallet Phishing Incident Jul 3, 2018
-
New RAMpage exploit revives Rowhammer attack to root Android devices Jul 3, 2018
-
Samsung phones are spontaneously texting users’ photos to random contacts without their permission Jul 3, 2018
-
$5.2 Million in Cryptocurrency Seized in EU’s Largest LSD Raid Jun 30, 2018
-
Feds Pose as Cryptocurrency Money Launderer to Bust Alleged Dark Web Dealers Jun 29, 2018
-
Facebook lifts crypto ban amid rumours of Coinbase acquisition Jun 29, 2018
-
Ticketmaster breached for months, personal data stolen by hackers Jun 29, 2018
-
Cryptocurrency Transactions May Uncover Sales of Shadow Broker Hacking Tools Jun 29, 2018
-
California Unanimously Passes Historic Privacy Bill Jun 29, 2018
-
Facebook patent would turn your mic on to analyze how you watch ads Jun 29, 2018
-
A new data breach may have exposed personal information of almost every American adult Jun 29, 2018
-
PROPagate Code Injection Technique Detected in the Wild for the First Time Jun 29, 2018
-
File-Wiping Malware Placed Inside Gentoo Linux Code After GitHub Account Hack Jun 29, 2018
-
Adidas Announces Data Breach Jun 29, 2018
-
DBGer Ransomware Uses EternalBlue and Mimikats to Spread Across Networks Jun 15, 2018
-
SEC announces cryptocurrency ether is not a security Jun 15, 2018
-
Malicious Docker Containers Earn Cryptomining Criminals $90K Jun 15, 2018
-
17 Backdoored Docker Images Removed From Docker Hub Jun 14, 2018
-
MIT Device Uses WiFi to ‘See’ Through Walls and Track Your Movements Jun 14, 2018
-
Cortana Hack Lets You Change Passwords on Locked PCs Jun 14, 2018
-
UK’s Dixons Carphone admits huge data breach Jun 14, 2018
-
Code Injection in Moodle Jun 14, 2018
-
Simple technique bypassed macOS signature checks by third-party tools Jun 13, 2018
-
Florida skips gun background checks for a year after employee forgets login Jun 13, 2018
-
Ethereum “Giveaway” Scammers Have Tricked People Out of $4.3 Million Jun 13, 2018
-
Apple Bans Apps That Mine Cryptocurrencies Jun 13, 2018
-
Bitcoin price takes a dive after another cryptocurrency exchange hack Jun 13, 2018
-
Tens of Thousands of Android Devices Are Exposing Their Debug Port Jun 13, 2018
-
Canada using Excel function for immigration lottery Jun 12, 2018
-
Hackers Crashed a Bank’s Computers While Attempting a SWIFT Hack Jun 12, 2018
-
Chinese hackers ‘steal US navy data on undersea warfare and supersonic missiles’ Jun 9, 2018
-
Flash zero-day exploit Jun 8, 2018
-
Blocking facial recognition surveillance using AI Jun 6, 2018
-
Malta Pilots Blockchain-Based Credentials Program Jun 6, 2018
-
Years of Police Dashcam Video Lost in Atlanta Ransomware Incident Jun 6, 2018
-
MyHeritage Genealogy Site Announces Mega Breach Affecting 92 Million Accounts Jun 6, 2018
-
Fitness app PumpUp leaked health data, private messages Jun 2, 2018
-
Hacker Defaces Ticketfly’s Website, Steals Customer Database Jun 2, 2018
-
An Exploit Left Millions of Steam Users Vulnerable for the Past 10 Years Jun 2, 2018
-
Automated Facial Recognition: Menace, Farce or Both? May 31, 2018
-
Sonic Tone Attacks Damage Hard Disk Drives, Crashes OS May 30, 2018
-
A security vulnerability in Git that can lead to arbitrary code execution May 30, 2018
-
HIDDEN COBRA – Joanap Backdoor May 30, 2018
-
Asus made a crypto-mining motherboard that supports up to 20 GPUs May 30, 2018
-
Critical RCE Flaw Discovered in Blockchain-Based EOS Smart Contract System May 29, 2018
-
Kenyans will soon need a license to post videos online May 29, 2018
-
Two Canadian banks say accounts compromised: CIBC 40,000 and BMO 50,000 May 29, 2018
-
Cryptocurrency Trading App Taylor Loses 2,500 ETH in $1.5M Hack May 28, 2018
-
Scammers raid man’s bank account while he waits on hold to fraud hotline May 28, 2018
-
Oracle Plans to Drop Java Serialization Support, the Source of Most Security Bugs May 28, 2018
-
China is exporting facial recognition software to Africa May 28, 2018
-
Epyc fail? We can defeat AMD’s virtual machine encryption, say boffins May 28, 2018
-
Freezing Your Credit Will Be Free Later This Year May 28, 2018
-
The Pentagon Has a Big Plan to Solve Identity Verification in Two Years May 28, 2018
-
A floating Pacific island is in the works with its own government, cryptocurrency and 300 houses May 28, 2018
-
Stablecoins: Brilliant idea or ticking time bomb? May 28, 2018
-
Bitcoin backlash as ‘miners’ stress power grids in Central Washington May 28, 2018
-
ZeppelinOS, a platform for smart contract applications in Ethereum May 28, 2018
-
GDPR Version of USA Today Is 500KB Instead of 5.2MB May 26, 2018
-
Doctor slammed by med board for selling $5 homeopathic sound waves for Ebola May 26, 2018
-
The FBI wants you to reboot your router NOW to help destroy a botnet May 26, 2018
-
Detecting Lies through Mouse Movements May 25, 2018
-
Blocking 500M Users Easier Than Complying with GDPR May 25, 2018
-
BackSwap malware finds innovative ways to empty bank accounts May 25, 2018
-
Z-Shave Attack Could Impact Over 100 Million IoT Devices May 25, 2018
-
Malware Found in the Firmware of 141 Low-Cost Android Devices May 25, 2018
-
The Ethereum-blockchain size has exceeded 1TB, and yes, it’s an issue May 25, 2018
-
Blockchain vs. Distributed Ledger Technologies Part 2: Governing Dynamics May 24, 2018
-
The DoJ is reportedly probing the murky world of bitcoin trading May 24, 2018
-
3 Charged In Fatal Kansas ‘Swatting’ Attack May 24, 2018
-
The Pentagon Released New Documents About the ‘Tic-Tac UFO’ May 24, 2018
-
Woman says Amazon recorded private conversation, sent it out to random contact May 24, 2018
-
Losses from BEC scams rising fast and furious May 24, 2018
-
Bitcoin Gold Hit by Double Spend Attack, Exchanges Lose Millions May 24, 2018
-
Sounds, pressure, brain injury: Case of US gov’t employee in China raises alert May 23, 2018
-
Backdoor Account Found in D-Link DIR-620 Routers May 23, 2018
-
New VPNFilter malware targets 100,000s of networking devices worldwide May 23, 2018
-
Over a dozen vulnerabilities uncovered in BMW vehicles May 23, 2018
-
Police use of Amazon’s face-recognition service draws privacy warnings May 23, 2018
-
Comcast bug made it shockingly easy to steal customers’ Wi-Fi passwords May 22, 2018
-
The Verge Hack, Explained May 22, 2018
-
SleuthQL: A SQL Injection Discovery Tool May 22, 2018
-
Google and Microsoft Reveal New Spectre Attack May 22, 2018
-
Barcelona is leading the fightback against smart city surveillance May 22, 2018
-
Teen phone monitoring app leaked thousands of user passwords May 22, 2018
-
The Evolving Debate Over EIP-999: Can (or Should) Trapped Ether Be Freed? May 21, 2018
-
Malware and Where to Find Them May 21, 2018
-
Potential Spy Devices Which Track Cellphones Found in D.C., Md., Va. May 21, 2018
-
T-Mobile Employee Made Unauthorized ‘SIM Swap’ to Steal Instagram Account May 21, 2018
-
Man faces up to 35 years in prison for helping hackers evade detection by anti-virus software May 21, 2018
-
LocationSmart Leaked Location Data for Customers of All Major U.S. Mobile Carriers May 18, 2018
-
A bug in Keeper password manager leads to sparring over “zero-knowledge” claim May 18, 2018
-
A flaw in a connected alarm system exposed vehicles to remote hacking May 18, 2018
-
This Guy Heated Bath Water With Bitcoin Mining and It Worked Too Well May 18, 2018
-
EU parliaments website in violation of GDPR May 18, 2018
-
Alexa, Siri and Google can be tricked by commands you can’t hear May 18, 2018
-
Dutch police seize servers of MaxiDed, a provider known for hosting malware ops May 18, 2018
-
Binary SMS – The old backdoor to your new thing May 18, 2018
-
Brutal cryptocurrency mining malware crashes your PC when discovered May 18, 2018
-
Hardcoded Password Found in Cisco Enterprise Software, Again May 18, 2018
-
Adware Launches In-Browser Mining Sites Pretending to be Cloudflare May 17, 2018
-
Mexican central bank confirmed that SWIFT hackers stole millions of dollars from Mexican Banks May 17, 2018
-
Inside the Takedown of Scan4You, a Notorious Malware Clearinghouse May 17, 2018
-
Forget scanning license plates; cops will soon ID you via your roof rack May 17, 2018
-
Hacker Breaches Securus, the Company That Helps Cops Track Phones Across the US May 17, 2018
-
Telegrab malware hijacks Telegram desktop sessions May 17, 2018
-
RedHat DHCP remote root execution vulnerability May 17, 2018
-
Hacker Publicly Posts Data Stolen From Government-Linked Cyberespionage Group May 17, 2018
-
Feds Raid Apartment of Suspected CIA Leaker, Find 10,000 Images of Child Porn May 16, 2018
-
Inside the business model for botnets May 16, 2018
-
Hiding Information in Plain Text May 15, 2018
-
A tale of two zero-days May 15, 2018
-
US cell carriers are selling access to real-time phone location data May 15, 2018
-
Turkey’s Government Tried to Hack Hundreds of Protesters Over Twitter, Researchers Say May 15, 2018
-
Detecting Cloned Cards at the ATM, Register May 15, 2018
-
Second wave of Spectre-like CPU security flaws won’t be fixed for a while May 15, 2018
-
The World’s First Trade Finance Transaction on the Blockchain Involves Soybeans May 14, 2018
-
Rail Europe had a three-month long credit card breach May 14, 2018
-
EFail – Vulnerabilities in end-to-end encryption technologies OpenPGP and S/MIME May 14, 2018
-
The State of Scaling Ethereum May 14, 2018
-
Critical PGP and S/MIME bugs can reveal encrypted e-mails May 14, 2018
-
Google under investigation for using Android phone data to secretly track users May 14, 2018
-
Card Breach Announced at Chili’s Restaurant Chain May 14, 2018
-
Internet Explorer 0-Day Discovered May 13, 2018
-
German online bank uses Bitcoins to transfer loans May 13, 2018
-
She didn’t see it coming: psychic arrested for $800,000 fraud May 13, 2018
-
Malware Found in the Ubuntu Snap Store May 12, 2018
-
CVE-2018-1000136 – Electron nodeIntegration Bypass May 12, 2018
-
Police Dept Loses 10 Months of Work to Ransomware. Gets Infected a Second Time May 12, 2018
-
Baltimore Police Can’t Explain Why Their All-Seeing Spy Planes Were Kept Secret May 12, 2018
-
Characteristics of the world’s first blockchain-smartphone revealed May 12, 2018
-
Cops Can Find the Location of Any Phone in the Country in Seconds May 12, 2018
-
iOS 11.4 to come with 7-day USB shutout May 12, 2018
-
UK cell giant EE left a critical code system exposed with a default password May 12, 2018
-
Malicious Chrome extensions infect 100,000-plus users, again May 12, 2018
-
Man Allegedly Used Change of Address Form to Move UPS Headquarters May 12, 2018
-
The source code of the TreasureHunter PoS Malware leaked online May 12, 2018
-
Lawmakers move to block government from ordering digital back doors May 12, 2018
-
Vigilante Hacks Government-Linked Cyberespionage Group May 10, 2018
-
Packets over a LAN are all it takes to trigger serious Rowhammer bit flips May 10, 2018
-
Nigerian BEC Scammers Growing Smarter, More Dangerous May 10, 2018
-
5 Powerful Botnets Found Exploiting Unpatched GPON Router Flaws May 10, 2018
-
One year later: EternalBlue exploit more popular now than during WannaCryptor outbreak May 10, 2018
-
Secrets of the Wiper: Inside the World’s Most Destructive Malware May 10, 2018
-
“Hide and Seek” Becomes First IoT Botnet Capable of Surviving Device Reboots May 10, 2018
-
You Can’t Handle the Truth About Facebook Ads, New Harvard Study Shows May 9, 2018
-
Malware Wallet ‘Electrum Pro’ Stealing Seed Keys May 9, 2018
-
Bikeshare System Hacked, Required to ‘Manually Update’ 2,000 Bikes May 9, 2018
-
Man who hit cops with laser, then crashed as he fled, ordered to prison May 9, 2018
-
Virginia Beach police plan to encrypt radio channels, stopping public from listening in May 9, 2018
-
‘Disappearing’ Signal Messages Are Stored Indefinitely on Mac Hard Drives May 9, 2018
-
Backdoored Python Library Caught Stealing SSH Credentials May 9, 2018
-
Critical bug in 7-Zip – make sure you’re up to date May 9, 2018
-
Cryptomining with JavaScript in an Excel spreadsheet May 9, 2018
-
Every major OS maker misread Intel’s docs. Now their kernels can be hijacked or crashed May 9, 2018
-
Microsoft Patches Two Zero-Day Flaws Under Active Attack May 9, 2018
-
Root cause analysis of the latest Internet Explorer zero day – CVE-2018-8174 May 9, 2018
-
Introducing WebAuthn support for secure Dropbox sign in May 9, 2018
-
Stablecoin TrueUSD passes $12 million in circulation in just 2 months May 9, 2018
-
Warriors’ Steph Curry will auction off celebrity CryptoKitties May 9, 2018
-
Uhh, Google Assistant Impersonating a Human on the Phone Is Scary as Hell to Me May 9, 2018
-
Critical vulnerability impacts Bitcoin Cash miners May 9, 2018
-
Equifax reveals full horror of its data breach May 8, 2018
-
UK police say 92-percent false positive facial recognition is no big deal May 8, 2018
-
Hundreds of big-name sites hacked, converted into drive-by currency miners May 8, 2018
-
Op-ed: Ray Ozzie’s crypto proposal—a dose of technical reality May 8, 2018
-
Even Privacy Advocates Are Tracking You Online May 8, 2018
-
SynAck targeted ransomware uses the Doppelgänging technique May 8, 2018
-
Ticketmaster to trial facial recognition technology at live venues May 6, 2018
-
That New Memory Smell: Tech Can Tell if Your Flash is New or Recycled May 6, 2018
-
Researchers link a decade of potent hacks to Chinese intelligence group May 6, 2018
-
Idaho State University Lost Enough Weapons-Grade Plutonium to Make a Dirty Bomb May 6, 2018
-
Telegram’s billion-dollar ICO has become a mess May 6, 2018
-
Half a million pacemakers need a security patch May 6, 2018
-
Internet Shortcut used in Necurs malspam campaign May 6, 2018
-
Australia’s Commonwealth Bank lost 20 Million customer records May 4, 2018
-
MassMiner Takes a Kitchen-Sink Approach to Cryptomining May 4, 2018
-
Twitter: You Should Change Your Twitter Password May 4, 2018
-
eBay, Organized Crime, and Evangelical Christians: The Ethical Minefield of Studying Ancient Civilizations May 4, 2018
-
Critical Cisco WebEx Bug Allows Remote Code Execution May 4, 2018
-
Nigerian Email Scammers Are More Effective Than Ever May 4, 2018
-
Oscar Mayer’s Cringey ‘Cryptocurrency’ Promotion Got Hit With a Cease-and-Desist May 4, 2018
-
Cyberespionage operation targets Android users in the Middle East May 4, 2018
-
New Rowhammer Attack Hijacks Android Smartphones Remotely May 4, 2018
-
Hello Kitty: Malware targets Drupal to mine for cryptocurrency May 4, 2018
-
Eltoo: A Simplified Update Mechanism for Lightning and Off-Chain Contracts May 4, 2018
-
Don’t Give Your DNA to Giant Genetic Databases May 3, 2018
-
Volkswagen Cars Open To Remote Hacking, Researchers Warn May 3, 2018
-
A New Cryptocurrency Mining Virus is Spreading Through Facebook May 3, 2018
-
The ‘Holy Grail’ of Cryptocurrency Looks Like the Banks We Already Know and Hate May 3, 2018
-
7-Zip: From Uninitialized Memory to Remote Code Execution May 3, 2018
-
China Claims It’s Scanning Workers’ Brainwaves to Increase Efficiency and Profits May 3, 2018
-
School District Pays $10,000 Bitcoin Ransom To Hackers After Cyberattack May 3, 2018
-
This malware checks your system temperature to sidestep sandboxing May 3, 2018
-
Man Who Hacked Jail Systems to Release His Friend Early Gets 7-Years in Prison May 1, 2018
-
Rediscovery, analysis and exploitation of a CIA zero-day MikroTik Vulnerability May 1, 2018
-
Spartacus ransomware: introduction to a strain of unsophisticated malware Apr 30, 2018
-
This Russian Company Sells Zero-Day Exploits for Hospital Software Apr 30, 2018
-
Home Chip Fabrication in 66 Steps Apr 30, 2018
-
Why the F-35 Isn’t Good Enough for Japan Apr 30, 2018
-
Three kinds of memory leaks Apr 30, 2018
-
The Pentagon Is Making a Ray Gun to Stop Truck Attacks Apr 29, 2018
-
Cops take dead man’s smartphone to his corpse in attempt to unlock it Apr 29, 2018
-
French museum discovers half of its collection are fakes Apr 29, 2018
-
Analysis: Zebrocy used heavily by the Sednit group over last two years Apr 29, 2018
-
People Are Turning Their Instagram Accounts into Bots Apr 29, 2018
-
As two Koreas shake hands, Hidden Cobra hackers wage espionage campaign Apr 29, 2018
-
The ultimate resource list for crypto traders and investors Apr 29, 2018
-
“Drupalgeddon2” Recent Developments Apr 29, 2018
-
New C# Ransomware Compiles itself at Runtime Apr 27, 2018
-
Police Body Cameras Could Get Facial Recognition Technology Apr 27, 2018
-
Nuclear Power Plants Have a ‘Blind Spot’ for Hackers. Here’s How to Fix That. Apr 27, 2018
-
I built a screenshot API and some guy was mining cryptocurrencies with it Apr 27, 2018
-
Impersonators who are paid to flirt on dating apps Apr 27, 2018
-
Ray Ozzie’s plan for unlocking encrypted phones gets a chilly reception Apr 27, 2018
-
PyRoMine Uses NSA Exploit for Monero Mining and Backdoors Apr 27, 2018
-
Immortalize Your Terrible Tweets on the Blockchain for the Low, Low Price of $9 Apr 27, 2018
-
GravityRAT – The Two-Year Evolution Of An APT Targeting India Apr 27, 2018
-
Drupal Remote Code Execution vulnerability exploited widely Apr 27, 2018
-
Fuzzing Adobe Reader for exploitable vulns (fun != profit) Apr 27, 2018
-
Nukes in the Age of AI Apr 26, 2018
-
Startup Offers $3 Million to Anyone Who Can Hack the iPhone Apr 26, 2018
-
Police Appear to Have Seized Revenge Porn Site Anon-IB Apr 26, 2018
-
Supreme Court Upholds Patent Office Power to Invalidate Bad Patents Apr 26, 2018
-
Bezop Cryptocurrency Server Spills 25K in Private Investor, Promoter Data Apr 26, 2018
-
Hackers built a ‘master key’ for millions of hotel rooms Apr 26, 2018
-
Amazon’s Alexa Hacked To Surreptitiously Record Everything It Hears Apr 26, 2018
-
Exclusive: NSA encryption plan for ‘internet of things’ rejected by international body Apr 26, 2018
-
Ride-hailing service Careem lost 14 million users’ data… in January Apr 26, 2018
-
Why investors pumped $133 million into “stablecoin” Basis Apr 26, 2018
-
Cops Take Down World’s Biggest ‘DDoS-For-Hire’ Site They Claim Launched 6 Million Attacks Apr 26, 2018
-
BGP leaks and cryptocurrencies Apr 26, 2018
-
Mysterious “double kill” IE zero-day allegedly in the wild Apr 25, 2018
-
Someone Is Trying to Extort iPhone Crackers GrayShift With Leaked Code Apr 25, 2018
-
Suspicious event hijacks Amazon traffic for 2 hours, steals cryptocurrency Apr 25, 2018
-
MyEtherWallet Confirmed Hack via DNS Loophole Apr 25, 2018
-
These People Are Selling the CIA’s Internal Board Game to the Public Apr 25, 2018
-
Hijack of Amazon’s domain service used to reroute web traffic for two hours Apr 25, 2018
-
Amazon Key expands to deliver packages inside your car Apr 24, 2018
-
CSE Malware ZLab – Malware Analysis Report: The Bandios malware suite Apr 24, 2018
-
Atlanta Spent $2.6M to Recover From $52,000 Ransomware Scare Apr 24, 2018
-
Whether Ethereum is a security Apr 24, 2018
-
Muhstik Botnet Exploits Highly Critical Drupal Bug Apr 24, 2018
-
New hacks siphon private cryptocurrency keys from airgapped wallets Apr 24, 2018
-
Transcription Service Leaked Medical Records Apr 24, 2018
-
The “unpatchable” exploit that makes every current Nintendo Switch hackable [Updated] Apr 24, 2018
-
Hackers Behind Healthcare Espionage Infect X-Ray and MRI Machines Apr 24, 2018
-
How DNA Transfer Framed Lukis Anderson for Murder Apr 24, 2018
-
We don’t know what to do if a satellite gets hacked Apr 23, 2018
-
Quantum Blockchains Could Act Like Time Machines Apr 23, 2018
-
Cryptomining Campaign Returns Coal and Not Diamond Apr 23, 2018
-
Cryptocurrencies Were Never Good for Anybody But the Rich Apr 23, 2018
-
Yahoo mega-breach hacker faces nearly 8 years in prison Apr 23, 2018
-
The US Navy Wants Undersea Gas Stations for Underwater Drones Apr 23, 2018
-
How China Is Buying Its Way into Europe Apr 23, 2018
-
Energetic Bear/Crouching Yeti: attacks on servers Apr 23, 2018
-
One year after ICO mania, these big-money projects are delivering Apr 23, 2018
-
The Web of Profit: A look at the cybercrime economy Apr 23, 2018
-
Google’s Project Zero exposes unpatched Windows 10 lockdown bypass Apr 23, 2018
-
Bitcoin Mining May Be Even Less Economically Viable Than We Thought Apr 22, 2018
-
FDA Wants Medical Devices to Have Mandatory Built-In Update Mechanisms Apr 22, 2018
-
FTC Puts Uber on a Short Leash for Security Breaches Apr 22, 2018
-
Why a Cryptocurrency Mining Giant Is Burning Money in a ‘Black Hole’ Apr 22, 2018
-
Insecure RSA Conference app leaked attendee data Apr 22, 2018
-
Teen Who Hacked Ex-CIA Director John Brennan Gets Sentenced to 2 Years of Prison Apr 22, 2018
-
Explore the Hidden Art on the Bitcoin Blockchain in ‘Message From the Mines’ Apr 22, 2018
-
The taxman matches Bitcoin transactions and bank transfers to identify people Apr 22, 2018
-
Government accidentally sends file on “remote mind control” to journalist Apr 22, 2018
-
Palantir Knows Everything About You Apr 19, 2018
-
iOS Sync Glitch Lets Attackers Control Devices Apr 19, 2018
-
Windows Exploitation Tricks: Exploiting Arbitrary File Writes for Local Elevation of Privilege Apr 19, 2018
-
Amazon Wins Patent for Data Stream to ‘Identify’ Bitcoin Users for Law Enforcement Apr 19, 2018
-
Upgradeable smart contracts in Ethereum Apr 19, 2018
-
A Sobering Look at Fake Online Reviews Apr 19, 2018
-
Tens of thousands of Facebook accounts compromised in days by malware Apr 19, 2018
-
Basis Protocol/Basecoin: the worst idea in cryptocurrency, reborn Apr 19, 2018
-
The Cat-and-Mouse Game Between Apple and the Manufacturer of an iPhone Unlocking Tool Apr 19, 2018
-
PBot: a Python-based adware Apr 19, 2018
-
A ‘Cryptocurrency’ Without a Blockchain Is Eating My City Apr 19, 2018
-
Why ‘remote detonator’ is a bad name for your Wi-Fi network Apr 19, 2018
-
ODNS: Oblivious DNS Apr 19, 2018
-
T-Mobile fined $40M for deceiving customers with fake ring tones Apr 19, 2018
-
Over 20,000,000 of Chrome Users are Victims of Fake Ad Blockers Apr 19, 2018
-
Inside the Unnerving CCleaner Supply Chain Attack Apr 19, 2018
-
Millions of Apps Leak Private User Data Via Leaky Ad SDKs Apr 18, 2018
-
Proof-Of-Work is a Decentralized Clock Apr 18, 2018
-
This Is the Facial Recognition Tool at the Heart of a Class Action Suit Against Facebook Apr 18, 2018
-
Magnitude exploit kit switches to GandCrab ransomware Apr 18, 2018
-
Intel Processors Now Allows Antivirus to Use Built-in GPUs for Malware Scanning Apr 18, 2018
-
Crypto YouTuber hacked out of $2M during a livestream Apr 17, 2018
-
US Navy Accused of Tech Piracy Apr 17, 2018
-
Facial recognition cameras on lamp posts to be tested in Singapore Apr 17, 2018
-
Roaming Mantis uses DNS hijacking to infect Android smartphones Apr 17, 2018
-
The Bitcoin Standard – a critical review Apr 17, 2018
-
IRS Says Fewer Than 100 People Have Reported Bitcoin Holdings So Far Apr 17, 2018
-
WhatsApp photo drug dealer caught by ‘groundbreaking’ work Apr 17, 2018
-
Microsoft Engineer Charged in Reveton Ransomware Case Apr 15, 2018
-
Understanding Bitcoin Transactions Apr 15, 2018
-
CVE-2017-0263 – reported exploit used to interfere the French election Apr 15, 2018
-
This coal power plant is being reopened for blockchain mining Apr 14, 2018
-
Agent Smith: How I Build a Profitable Crypto Arbitrage Bot Apr 14, 2018
-
People Who Own Cryptocurrency Are Getting Slammed With More Taxes Than They Expected Apr 14, 2018
-
Malware monitor – leveraging PyREBox for malware analysis Apr 14, 2018
-
Coinsecure, not so secure: Millions in cryptocurrency stolen, CSO branded as thief Apr 13, 2018
-
Goodbye ICOs, hello ILPs? Apr 13, 2018
-
An Alleged $660 Million ICO Scam Sparked a Protest In Vietnam Apr 13, 2018
-
Cops Around the Country Can Now Unlock iPhones, Records Show Apr 13, 2018
-
List of the top smart contract vulnerabilities Apr 13, 2018
-
PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines Apr 13, 2018
-
New ‘Early Bird’ Code Injection Technique Helps APT33 Evade Detection Apr 13, 2018
-
Some Android Phone Manufacturers Lying to Users About Security Updates Apr 13, 2018
-
All Your Base64 Are Belong To Us – Dynamic vs. Static Analysis of Web Content Apr 13, 2018
-
Breaking RSA OAEP with Manger Attack Apr 12, 2018
-
Post-quantum confidentiality for TLS Apr 12, 2018
-
Thousands of hacked websites are infecting visitors with malware Apr 12, 2018
-
Breach at UK’s Great Western Railway: Commuters told to reset passwords Apr 12, 2018
-
Google, Microsoft, and Mozilla Put Their Backing Behind New WebAuthn API Apr 12, 2018
-
Web Browsers Reject About Two-Thirds of Cookies Apr 12, 2018
-
Cryptocurrency traders use gold to woo Muslim investors Apr 11, 2018
-
Practical passwordless authentication comes a step closer with WebAuthn Apr 11, 2018
-
How we made $100K arbitraging CryptoKitties Apr 11, 2018
-
After CryptoKitties, the ‘Cryptocollectibles’ Business Is Booming Apr 11, 2018
-
China forces spyware onto Muslim’s Android phones, complete with security holes Apr 11, 2018
-
Researchers Rickrolled Emergency Alert Sirens in Proof-of-Concept Hack Apr 10, 2018
-
Whatever you do, don’t give this programmable payment card to your waiter Apr 10, 2018
-
Under a millimeter wide and powered by light, tiny cameras could hide anywhere Apr 10, 2018
-
Chinese Government Forces Residents To Install Surveillance App With Awful Security Apr 10, 2018
-
How to Mine Bitcoin for Free With Google BigQuery Apr 10, 2018
-
What Is an ASIC Miner and Is It the Future of Cryptocurrency? Apr 10, 2018
-
Sodexo Filmology data breach – Users need cancel their credit cards Apr 10, 2018
-
Hacker mines up to $1 million in Verge after exploiting major bug Apr 10, 2018
-
New Matrix Ransomware Variants Installed Via Hacked Remote Desktop Services Apr 10, 2018
-
Cryptocurrency and taxes – it’s complicated Apr 9, 2018
-
Don’t Give Away Historic Details About Yourself Apr 9, 2018
-
How to keep your ISP’s nose out of your browser history with encrypted DNS Apr 9, 2018
-
Iran hit by global cyber attack that left U.S. flag on screens Apr 9, 2018
-
Three Execs Get Prison Time for Pirating Oracle Firmware Patches Apr 7, 2018
-
Exploiting Bluetooth Low Energy using Gattacker for IoT – Step-by-Step Guide Apr 7, 2018
-
T-Mobile Stores Part of Customers’ Passwords In Plaintext, Says It Has ‘Amazingly Good’ Security Apr 7, 2018
-
Systems built on trust, norms, and institutions function better than blockchain Apr 7, 2018
-
FUZE — This $2.5 Million ‘Secure’ Bluetooth Credit Card Might Be Leaking Bank Data Apr 7, 2018
-
This Tool Can Help Identify Leakers Who Copy and Paste Secret Info Apr 7, 2018
-
Cyberinsurance Tries to Tackle the Unpredictable World of Hacks Apr 7, 2018
-
Ethereum’s Compact Merkle Trie Apr 7, 2018
-
Hacker Uses Exploit to Generate Verge Cryptocurrency out of Thin Air Apr 6, 2018
-
Sears Holdings, Delta and others leak credit cards in “multibreach” Apr 6, 2018
-
“Open sesame”: Industrial network gear hackable with the right username Apr 6, 2018
-
Malware Attack on Vendor to Blame for Delta and Sears Data Breach Affecting ‘Hundreds of Thousands’ of Customers Apr 6, 2018
-
Bitcoin Tracker Chainalysis Raises $16 Million, Plans to Track 10 More Cryptocurrencies Apr 6, 2018
-
OSX_OCEANLOTUS.D, a new macOS backdoor linked to APT 32 group Apr 5, 2018
-
Okay, Let’s Talk About John McAfee’s Paid Cryptocurrency Promotions Apr 5, 2018
-
Secret Service Warns of Chip Card Scheme Apr 5, 2018
-
Smoking Out the Rarog Cryptocurrency Mining Trojan Apr 5, 2018
-
Why Investors Are Betting Millions On Bitcoin Surveillance Apr 5, 2018
-
The FBI could have broken into San Bernadino shooter’s phone without Apple Apr 5, 2018
-
India’s central bank bans all cryptocurrency dealings Apr 5, 2018
-
Fixed security exploit in Google’s search engine Apr 5, 2018
-
MailChimp’s Ban on Cryptocurrency Marketing Is Causing Collateral Damage Apr 5, 2018
-
Intel Tells Remote Keyboard Users to Delete App After Critical Bug Found Apr 5, 2018
-
Fin7: The Billion-Dollar Hacking Group Behind a String of Big Breaches Apr 5, 2018
-
Dot-cm Typosquatting Sites Visited 12M Times So Far in 2018 Apr 4, 2018
-
Intel Admits It Won’t Be Possible to Fix Spectre (V2) Flaw in Some Processors Apr 4, 2018
-
Pocket cryptofarms Apr 4, 2018
-
Man Who Spent $100K to Remove a Lie from Google Apr 4, 2018
-
Ethereum Founder Vitalik Buterin Is Beefing With the Guy Who Claimed to Be Satoshi Nakamoto Apr 4, 2018
-
The Feds Charged the Masterminds Behind a DJ Khaled-Endorsed ICO With Fraud Apr 4, 2018
-
Floyd Mayweather-backed cryptocurrency ICO was fraud, SEC says Apr 4, 2018
-
Intel FSP reverse engineering: finding the real entry point Apr 4, 2018
-
Backdooring popular windows plugins Apr 4, 2018
-
Panera Bread did nothing about its customer data vulnerability for eight months Apr 4, 2018
-
Panerabread.com leaks millions of customer records Apr 4, 2018
-
Chrome Is Scanning Files on Your Computer, and People Are Freaking Out Apr 4, 2018
-
Google Bans All Cryptomining Extensions From the Chrome Store Apr 4, 2018
-
Commonwealth Bank of Australia Tries to Explain Coding Errors Found After 4 Years Apr 3, 2018
-
Cloudflare Launches Publicly DNS-Over-HTTPS Service Apr 3, 2018
-
Fake AV Investigation Unearths KevDroid, New Android Malware Apr 3, 2018
-
Credit Card Data Swiped From 5M Saks, Lord & Taylor Customers Apr 3, 2018
-
China Slaps Tariffs on U.S. Products Apr 3, 2018
-
The most honest Ponzi scheme of all time Apr 3, 2018
-
Web Application Penetration Testing Cheat Sheet Apr 3, 2018
-
Cap Ethereum Total Supply, Says Vitalik Buterin Apr 3, 2018
-
1.1.1.1 – The Internet’s Fastest, Privacy-First DNS Resolver Apr 3, 2018
-
The Under Armour Hack Was Even Worse Than It Had To Be Apr 2, 2018
-
Even as Bitcoin Languishes, Telegram Raises $1.7 Billion Ahead of Largest ICO Ever Mar 31, 2018
-
Intel Files Patent For Energy-Efficient Bitcoin Mining Hardware Mar 31, 2018
-
Mailchimp Is Shutting Down ICO and Blockchain-Related Emails Mar 31, 2018
-
Under Armour announces significant data breach of its MyFitnessPal app Mar 31, 2018
-
The FBI Used Classified Hacking Tools in Ordinary Criminal Investigations Mar 31, 2018
-
These Ethereum Mining Rig Trading Cards Are the Nerdiest Thing We’ve Ever Seen Mar 31, 2018
-
Grindr security flaw exposes users’ location data Mar 31, 2018
-
What Is a Bitcoin ‘Death Cross’ and Why Is Everyone Talking About It? Mar 31, 2018
-
In-depth Formbook malware analysis Mar 31, 2018
-
Wall Street rethinks blockchain projects as euphoria meets reality Mar 31, 2018
-
Rhode Island Backs Off Ridiculous Plan to Block Porn, Charge $20 to Bypass Filters Mar 31, 2018
-
Omitting the “o” in .com Could Be Costly Mar 31, 2018
-
Hackers hit 911 system, emergency dispatch affected Mar 31, 2018
-
Boeing production plant infected with WannaCry ransomware Mar 29, 2018
-
Asian Powers Step Up Their Readiness For Space Warfare, Following America’s Lead Mar 29, 2018
-
Drupalgeddon: Critical Flaw Exposes Million Drupal Websites to Attacks Mar 29, 2018
-
An in-depth malware analysis of QuantLoader Mar 29, 2018
-
Your malware reesrch new friend, KLara Mar 29, 2018
-
How On Earth Did Russia Hack Our Energy Systems? Mar 29, 2018
-
Monero traceability Mar 28, 2018
-
Fiber Lasers Mean Ray Guns Are Coming Mar 28, 2018
-
81% of ICO’s were Scams Mar 28, 2018
-
With Musical Cryptography, Composers Can Hide Messages in Their Melodies Mar 28, 2018
-
VirusBay Aims To Make Malware Analysis More Social Mar 28, 2018
-
The phenomenon of smart contract honeypots Mar 28, 2018
-
Logs in High Sierra Show Plaintext Password for APFS Encrypted External Volumes Mar 27, 2018
-
It’s not just Spectre: Researchers reveal more branch prediction attacks Mar 27, 2018
-
Adding ERC20 Support to Coinbase Mar 27, 2018
-
Watch Someone Break Into a Hotel Room Using Just a Paper Menu Mar 26, 2018
-
How a Political Engineering Firm Exposed Their Code Base Mar 26, 2018
-
New Spyware Company ‘Grey Heron’ Is Linked to Hacking Team Mar 26, 2018
-
Europol tracks down suspected leader of Carbanak malware campaigns Mar 26, 2018
-
Who and What Is Coinhive? Mar 26, 2018
-
Is The Future Of Blockchains DAGs ?— 5 Lessons From The Hashgraph Event In NYC on March 13th Mar 26, 2018
-
Code your own Proof of Stake blockchain in Go Mar 26, 2018
-
IRS reminds taxpayers to report virtual currency transactions Mar 26, 2018
-
A new massive cryptomining campaign target Linux servers exploiting old flaw Mar 26, 2018
-
Thousands of etcd installs leak 750MB worth of passwords and keys Mar 25, 2018
-
Facebook scraped call, text message data for years from Android phones Mar 25, 2018
-
GhostMiner: Cryptomining Malware Goes Fileless Mar 25, 2018
-
State Department Seemingly Buys $15,000 iPhone Cracking Tech GrayKey Mar 25, 2018
-
US Military Aims to Start Using Laser Weapon That Produces Voices by 2021 Mar 25, 2018
-
Our suite of Ethereum security tools Mar 25, 2018
-
Hansen: Omaha man ‘liked’ a tweet, and then he lost his dream job Mar 25, 2018
-
Facebook Logs Calls, Texts Mar 25, 2018
-
Life Cycle of a Web App 0 Day Mar 24, 2018
-
Deep dive on the most severe Kubernetes vulnerabilities to date – CVE-2017-1002101 and CVE-2017 Mar 24, 2018
-
Tracking ransomware end-to-end Mar 24, 2018
-
South Korea Planning to Formally Allow ICOs Mar 23, 2018
-
France to create legal framework for ICOs Mar 23, 2018
-
Behavioral Crypto-Economics: The challenge and promise of blockchain incentive design Mar 23, 2018
-
Responsibility Deflected, the CLOUD Act Passes Mar 23, 2018
-
Atlanta city government systems down due to ransomware attack Mar 23, 2018
-
Pablo Escobar’s Brother Says He Met an FBI Agent Posing As Satoshi Nakamoto Mar 23, 2018
-
Survey: Americans Spent $1.4B on Credit Freeze Fees in Wake of Equifax Breach Mar 23, 2018
-
Ransomware Takes Open-Source Path, Encrypts With GNU Privacy Guard Mar 22, 2018
-
There’s a New Cold War Brewing in Space Mar 22, 2018
-
Best Buy will stop selling Huawei smartphones Mar 22, 2018
-
Non-Lethal Weapon: DOD seeks to use lasers to create shouting will-o-the-wisp Mar 22, 2018
-
Best bad idea ever? Why Putin’s nuclear-powered missile is possible… and awful Mar 22, 2018
-
Google is working on their own Blockchain Mar 22, 2018
-
What is a DAPP? Mar 22, 2018
-
Multiversum: This is What a 4th-Generation Blockchain Looks Like Mar 22, 2018
-
SXSW 2018: 10 Crypto & Blockchain Takeaways Mar 22, 2018
-
YouTube’s fake views economy Mar 21, 2018
-
FBI raids home of spy sat techie over leak of secret comms source code on Facebook Mar 21, 2018
-
SwissRealCoin promises a stable cryptocurrency backed by Swiss real estate Mar 20, 2018
-
Facebook’s Cambridge Analytica scandal, explained Mar 20, 2018
-
Chinese Companies Are Buying Up Cash-Strapped U.S. Colleges Mar 20, 2018
-
Canada Is Gearing Up to Regulate Cryptocurrency Mar 20, 2018
-
15-Year-old Finds Flaw in Ledger Crypto Wallet Mar 20, 2018
-
Lightning on Stellar: Technical Spec and Roadmap Mar 20, 2018
-
Telegram forced to give encryption keys to Russian authorities Mar 20, 2018
-
The NSA Worked to “Track Down” Bitcoin Users, Snowden Documents Reveal Mar 20, 2018
-
Orbitz says hacker stole two years’ worth of customer data Mar 20, 2018
-
US spy lab wants to geolocate any video or photo taken outdoors Mar 20, 2018
-
Breaking the Ledger Crypto Wallet Security Model Mar 20, 2018
-
Dynamic analysis of iOS apps without Jailbreak Mar 20, 2018
-
Scan for open S3 buckets and dump Mar 20, 2018
-
Why It’s Important That Monero Rejects Compatibility With Bitmain’s New Antminer Mar 20, 2018
-
A Flash of Insights on Lightning Network Mar 20, 2018
-
Facebook’s Mark Zuckerberg Lost $6 Billion the Day After Cambridge Analytica’s Data Misuse Was Revealed Mar 20, 2018
-
Taking down Gooligan the infamous Android botnet – a retrospective analysis Mar 20, 2018
-
For $15,000, GrayKey promises to crack iPhone passcodes for police Mar 20, 2018
-
This Android malware redirects calls you make to your bank to go to scammers instead Mar 19, 2018
-
A picture got my PostgreSQL database to start mining Monero Mar 19, 2018
-
First U.S. cryptocurrency ban outlaws Venezuela’s ‘Petro’ coin Mar 19, 2018
-
When China hoards its hackers everyone loses Mar 18, 2018
-
Report: Twitter to Ban Many Cryptocurrency Ads Mar 18, 2018
-
Ether plunges after SEC says “dozens” of ICO investigations underway Mar 18, 2018
-
Meltdown, Spectre, and the Costs of Unchecked Innovation Mar 18, 2018
-
Schools Are Spending Millions on High-Tech Surveillance of Kids Mar 18, 2018
-
To find suspects, police quietly turn to Google Mar 17, 2018
-
50M Facebook profiles harvested for Cambridge Analytica in major data breach Mar 17, 2018
-
Top Five Ways I gained access to Your Corporate Wireless Network Mar 17, 2018
-
Chinese Hackers Hit U.S. Firms Linked to South China Sea Dispute Mar 16, 2018
-
New York power companies can now charge Bitcoin miners more Mar 16, 2018
-
US spy lab hopes to geotag every outdoor photo on social media Mar 16, 2018
-
Watch Dutch Cops Storm A 3D-Printing Dark Web Drug Den Mar 16, 2018
-
Four Alleged Associates of Sinaloa Cartel-Linked Encrypted Phone Company Are On the Run Mar 16, 2018
-
Russia Hacks Into U.S. Power Plants, But Nuclear Reactors Should Be Impervious Mar 16, 2018
-
De-anonymizing programmers from executable binaries Mar 16, 2018
-
GrayKey iPhone unlocker poses serious security concerns Mar 16, 2018
-
Technology Meant to Make Bitcoin Money Again Just Went Live Mar 16, 2018
-
How Intel Is Moving From Software Fixes to Hardware Redesigns to Combat Spectre and Meltdown Mar 16, 2018
-
This City Just Passed the First Bitcoin Mining Ban in the US Mar 16, 2018
-
Yet again, Google tricked into serving scam Amazon ads Mar 16, 2018
-
How We Reverse Engineered the Cuban “Sonic Weapon” Attack Mar 16, 2018
-
GandCrab Ransomware Crooks Take Agile Development Approach Mar 16, 2018
-
Pre-Installed Malware Found On 5 Million Popular Android Phones Mar 16, 2018
-
Iran-Linked Group ‘TEMP.Zagros’ Updates Tactics, Techniques In Latest Campaign Mar 16, 2018
-
A New Backdoor Around the Fourth Amendment: The CLOUD Act Mar 16, 2018
-
Anti-anti-virus service provider tied to huge hacks cops plea Mar 16, 2018
-
Malware attack on 400k PCs caused by backdoored BitTorrent app Mar 16, 2018
-
Malware attack on 400k PCs caused by backdoored BitTorrent app Mar 16, 2018
-
A Cyberattack in Saudi Arabia Had a Deadly Goal. Experts Fear Another Try. Mar 16, 2018
-
EU wants to require platforms to filter uploaded content, including code Mar 16, 2018
-
You Can Hack Almost Any Smart Device With A Google Search Mar 16, 2018
-
Naiveté About CFIUS And U.S. National Security Policy Towards Foreign Investment Mar 16, 2018
-
New Web-Based Malware Distribution Channel ‘BlackTDS’ Surfaces Mar 15, 2018
-
How To Hack A Brooklyn Diner Using Google Mar 15, 2018
-
Equifax CIO Put ‘2 and 2 Together’ Then Sold Stock, SEC Says Mar 14, 2018
-
New POS Malware PinkKite Takes Flight Mar 14, 2018
-
‘One of the Biggest’ Coinhive Users Made $7.69 In 3 Months Mar 14, 2018
-
Rootkit analysis Mar 14, 2018
-
Questioning the motive behind the security allegations against AMD Mar 14, 2018
-
Video shows Navy jet’s encounter with a UFO, group says Mar 14, 2018
-
Google will ban all cryptocurrency-related advertising Mar 14, 2018
-
Dangerous malware stealing bitcoin hosted on Download.com for years Mar 14, 2018
-
Dark Web Map: Introduction Mar 14, 2018
-
A Florida Bill Would Make Criminal Justice Data More Transparent Than Ever Mar 14, 2018
-
Analysis of a Kubernetes hack — Backdooring through kubelet Mar 14, 2018
-
Authenticated Samba users can change other users’ password Mar 14, 2018
-
Researchers Point to an AMD Backdoor—And Face Their Own Backlash Mar 14, 2018
-
U.S. Navy Under Fire in Mass Software Piracy Lawsuit Mar 13, 2018
-
Several privacy-busting bugs found in popular VPN services Mar 13, 2018
-
Exploits in C/C++ to compiled JavaScript / WebAssembly Mar 13, 2018
-
Researchers Say AMD Processors Have Serious Vulnerabilities and Backdoors Mar 13, 2018
-
CredSSP Flaw in Remote Desktop Protocol Affects All Versions of Windows Mar 13, 2018
-
Let’s Encrypt wildcard support launched today Mar 13, 2018
-
The International Monetary Fund Has a Dystopian Vision for the Blockchain Mar 13, 2018
-
Reversing a Self-Modifying Binary with radare2 Mar 13, 2018
-
Security Researchers Publish Ryzen Flaws, Gave AMD 24 Hours Prior Notice Mar 13, 2018
-
China-Linked APT15 Used Myriad of New Tools To Hack UK Government Contractor Mar 13, 2018
-
Hancitor: fileless attack with a kernel trick Mar 13, 2018
-
Time of death? A therapeutic postmortem of connected medicine Mar 13, 2018
-
ACLU is Suing the Government for Info About TSA Device Searches Mar 13, 2018
-
NSA Retreats From Targeted PCs If They’re Already Infected by Other APT Malware Mar 13, 2018
-
Scanning the Alexa Top 1M for .DS_Store files Mar 13, 2018
-
JavaScript Zero: real JavaScript, and zero side-channel attacks Mar 13, 2018
-
Here’s How Litecoin overtakes Bitcoin, and Amazon is the Key Mar 13, 2018
-
German Income Tax on Virtual Currencies Mar 13, 2018
-
There’s a currency miner in the Mac App Store, and Apple seems OK with it Mar 13, 2018
-
Regaxor: Fuzzing Regexes for Fun and Not‐So‐Much Profit Mar 13, 2018
-
Air gapping PCs won’t stop data sharing thanks to sneaky speakers Mar 13, 2018
-
Questions for TSA after reports of laptop and phone searches on domestic flights Mar 13, 2018
-
MOSQUITO Attack Allows Air-Gapped Computers to Covertly Exchange Data Mar 13, 2018
-
Data breach victims can sue Yahoo in the United States: judge Mar 13, 2018
-
China ALTERED its public vuln database to conceal spy agency tinkering – research Mar 12, 2018
-
‘Snitches Get Stitches:’ How Secure Phones for Criminals Are Sold on Instagram Mar 12, 2018
-
Hacked Retail Robots Can Assault Customers With Porn and Demand Bitcoin Mar 12, 2018
-
20% of all Node.js modules found vunerable to injection attacks Mar 12, 2018
-
The South America connection and the leadership on ATM Malware development Mar 12, 2018
-
As the Ice Melts, Nuclear Submarines Train for Arctic War Mar 12, 2018
-
Somebody’s watching! When cameras are more than just ‘smart’ Mar 12, 2018
-
DJI Spark hijacking Mar 12, 2018
-
Fuzzing arbitrary functions in ELF binaries Mar 12, 2018
-
China eyes ‘black tech’ to boost security as parliament meets Mar 12, 2018
-
The military keeps encountering UFOs. Why doesn’t the Pentagon care? Mar 12, 2018
-
Governments rely on Sandvine network gear to deliver spyware and miners Mar 11, 2018
-
Master password in Firefox or Thunderbird? Do not bother Mar 11, 2018
-
Senate Bill Meant To Punish Equifax Might Actually Reward It Mar 11, 2018
-
The SEC Kills Crypto Exchanges Mar 10, 2018
-
SgxSpectre Attack Can Extract Data from Intel SGX Enclaves Mar 10, 2018
-
Potent malware that hid for six years spread through routers Mar 10, 2018
-
Hackers, Not Users, Lose Money in Attempted Cryptocurrency Exchange Heist Mar 10, 2018
-
FCC Accuses Stealthy Startup of Launching Rogue Satellites Mar 10, 2018
-
APT Hackers Infect Routers to Covertly Implant Slingshot Spying Malware Mar 10, 2018
-
Getting any Facebook user’s friend list and partial payment card details Mar 10, 2018
-
ISPs Caught Injecting Cryptocurrency Miners and Spyware In Some Countries Mar 10, 2018
-
Echidna, a smart fuzzer for Ethereum Mar 10, 2018
-
New traces of Hacking Team in the wild Mar 10, 2018
-
Russian hackers stole 860,000 euros from 32 ATMs belonging to the Raiffeisen Romania in just one night Mar 9, 2018
-
This Is What Happens When Bitcoin Miners Take Over Your Town Mar 9, 2018
-
Documents Prove Local Cops Have Bought Cheap iPhone Cracking Tech Mar 9, 2018
-
Amazon Partnership with British Police Alarms Privacy Advocates Mar 9, 2018
-
New Cryptocurrency Mining Malware Infected Over 500,000 PCs in Just Few Hours Mar 8, 2018
-
Look-Alike Domains and Visual Confusion Mar 8, 2018
-
That Sketchy Steven Seagal-Endorsed ICO Is Under Siege By State Regulators Mar 8, 2018
-
How Dutch Police Took Over Hansa, a Top Dark Web Market Mar 8, 2018
-
Spyware maker shuts down surveillance services after hacks Mar 8, 2018
-
Corero Network discovered a Kill Switch for Memcached DDoS attacks Mar 8, 2018
-
Unprompted, creepy laughter from Alexa is freaking out Echo users Mar 8, 2018
-
FBI again calls for magical solution to break into encrypted phones Mar 8, 2018
-
Bitcoin falls 10 percent after SEC warns about unregulated exchanges Mar 8, 2018
-
Statement on Potentially Unlawful Online Platforms for Trading Digital Assets (ICO) Mar 8, 2018
-
Blockchain technology is on a collision course with EU privacy law Mar 8, 2018
-
Multiple Vulnerabilities in PHP Could Allow for Arbitrary Code Execution Mar 8, 2018
-
Here’s a Leaked Brochure for New Spyware Company ‘Grey Heron’ Mar 7, 2018
-
An Energy War in the Balkans Has Slowed Europe’s Electric Clocks by 5 Minutes Mar 7, 2018
-
Leaked NSA Tool ‘Territorial Dispute’ Reveals the Agency’s List of Enemy Hackers Mar 7, 2018
-
Exim Off-By-one RCE: Exploiting CVE-2018-6789 with Fully Mitigations Bypassing Mar 7, 2018
-
RCE flaw in Exim MTA affects half of the email servers online Mar 7, 2018
-
Clocks in Europe are slowly deviating because of an energy war in the Balkans Mar 7, 2018
-
How Hackers Bypassed an Adobe Flash Protection Mechanism Mar 7, 2018
-
Leaked Files Show How NSA Tracks Other Countries’ Hackers Mar 7, 2018
-
Serious code-execution vulnerability in Exim Mar 7, 2018
-
Fraudsters Jailed for £37m Copycat Website Scam Mar 7, 2018
-
FBI’s Use of Paid Best Buy Informants Goes Deeper Than We Knew Mar 7, 2018
-
What Is Your Bank’s Security Banking On? Mar 7, 2018
-
One Single Malicious Vehicle Can Block ‘Smart’ Street Intersections in the US Mar 7, 2018
-
A Former Apple Security Engineer’s Company Will Unlock Your iPhone X—for $15,000 Mar 7, 2018
-
Do your voting machines connect to the Internet, US senator asks CEO Mar 7, 2018
-
POS Malware Found at 160 Applebee’s Restaurant Locations Mar 7, 2018
-
New documents reveal FBI paid Geek Squad repair staff as informants Mar 7, 2018
-
$20 porn-unblocking fee could hit Internet users if state bill becomes law Mar 7, 2018
-
Encryption 101: How to break encryption Mar 7, 2018
-
A Small American Town Wants to Put a Moratorium on Bitcoin Mining Mar 7, 2018
-
Google Is Quietly Providing AI Technology for Drone Strike Targeting Project Mar 7, 2018
-
‘Stalkerware’ Seller Shuts Down Apps ‘Indefinitely’ After Getting Hacked Again Mar 7, 2018
-
Researchers Bypassed Windows Password Locks With Cortana Voice Commands Mar 7, 2018
-
Gozi ISFB Remains Active in 2018, Leverages “Dark Cloud” Botnet For Distribution Mar 7, 2018
-
20 ICOs to watch in March Mar 6, 2018
-
LTE security flaws could be used for spying, spreading chaos Mar 6, 2018
-
Pennsylvania Sues Uber Over Data Breach Disclosure Mar 6, 2018
-
MoviePass CEO says the app tracks your location before and after movies Mar 6, 2018
-
Knot Forensics Mar 6, 2018
-
Coinbase Is Getting Sued for Insider Trading Mar 6, 2018
-
Brain-damaging “health attacks” spur US to permanently cut Cuba embassy staff Mar 6, 2018
-
Brit semiconductor tech ended up in Chinese naval railgun Mar 6, 2018
-
I got infected with malware and appreciated by its author Mar 6, 2018
-
It’s time to ditch SMS-based 2 Factor Auth Mar 6, 2018
-
How I discovered Instagram’s upcoming video calling feature on iOS Mar 5, 2018
-
Why the roots of patent trolling may be in the patent office Mar 5, 2018
-
Researchers Find 34,200 Vulnerable Ethereum Smart Contracts Mar 5, 2018
-
How Airlines don’t care about your privacy: Case Study Emirates.com Mar 5, 2018
-
Adware vendors buy Chrome Extensions to send ad- and malware-filled updates Mar 5, 2018
-
Undocumented Double-Spend Risk in Bitcoin Mar 5, 2018
-
A Likely Explanation for the “Sonic Weapon” Used at the U.S. Embassy in Cuba Mar 5, 2018
-
From SpankChain to Bigboobscoin, Startups Keep Trying to Get People to Pay for Sex on the Blockchain Mar 5, 2018
-
Putin’s Hypersonic Weapon Appears to Be a Modified Iskander Ballistic Missile Mar 5, 2018
-
MI5 agents can commit crime in UK, government reveals Mar 3, 2018
-
U.S. Has Been Watching Russia’s Nuclear-Powered Cruise Missiles Crash and Burn Mar 3, 2018
-
Ethereum fixes serious “eclipse” flaw that could be exploited by any kid Mar 3, 2018
-
Hackers Are Stuffing DDoS Attacks with Monero Ransom Notes Mar 3, 2018
-
China Presses Its Internet Censorship Efforts Across the Globe Mar 3, 2018
-
Bitcoin thirst spurs Icelandic heist—“Grand theft on a scale unseen before” Mar 3, 2018
-
Powerful New DDoS Method Adds Extortion Mar 3, 2018
-
U.S. Navy awards Lockheed Martin a $150M contract to develop laser weapons Mar 3, 2018
-
A Supreme Court Case That Could Give Tech Giants More Power Mar 3, 2018
-
WebKit exploit write-up Mar 3, 2018
-
Facebook Threatens Satire Site Over CNN Story That Snopes Rated ‘False’ Mar 3, 2018
-
A $5 Billion Cryptocurrency Has Enraged Cryptographers Mar 3, 2018
-
New LTE attacks can snoop on messages, track locations and spoof emergency alerts Mar 3, 2018
-
Here’s the Letter Israel Sent to Solicit Zero-Days From American Hackers Mar 3, 2018
-
Bitcoin faces regulatory crackdown, Bank of England warns Mar 3, 2018
-
Fact-checking the Tor Project’s government ties Mar 3, 2018
-
Vladimir Putin’s Nuclear-Powered Cruise Missile Is ‘Batshit Crazy’ Mar 3, 2018
-
Chrome lets hackers phish even ‘Unphishable’ Yubikey users Mar 3, 2018
-
SEC pursues dozens of companies in cryptocurrency ICO crackdown Mar 3, 2018
-
Ad network circumvents blockers to hijack browsers for cryptocurrency mining Mar 3, 2018
-
The Return of Software Vulnerabilities in the Brazilian Voting Machine Mar 3, 2018
-
Uber Creator Invents New Cryptocurrency—And Wants Your Help Making It Reality Mar 2, 2018
-
Tobii Eye Tracker’s accuracy frightens me Mar 2, 2018
-
Hackers exploiting rTorrent to install Unix coin miner have netted $4k so far Mar 2, 2018
-
FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines Mar 2, 2018
-
Spectre exploit demo Mar 2, 2018
-
Amazon’s policies promote counterfeiting Mar 2, 2018
-
Putin boasts new strategic weapons will make US missile defense “useless” Mar 2, 2018
-
Memcrashed – Major amplification attacks from UDP port 11211 Mar 2, 2018
-
Memcached-fueled 1.3 Tbps attacks Mar 2, 2018
-
Equifax finds ANOTHER 2.4 million Americans hit by breach Mar 2, 2018
-
The Powerful Global Spy Alliance You Never Knew Existed Mar 2, 2018
-
Norway Used NSA Technology for Potentially Illegal Spying Mar 2, 2018
-
A 1.3Tbs DDoS Hit GitHub, the Largest Yet Recorded Mar 2, 2018
-
GitHub February 28th DDoS Incident Report Mar 2, 2018
-
New Study Shows 20% of Public AWS S3 Buckets are Writable Mar 2, 2018
-
23,000 HTTPS certificates axed after CEO emails private keys Mar 2, 2018
-
The Rising Tide of China’s Human Intelligence Mar 2, 2018
-
Instagram image of Lego assault rifle, threat lead to 14-year-old’s arrest Mar 2, 2018
-
RedDrop: the blackmailing mobile malware family lurking in app stores Mar 1, 2018
-
Massive Malspam Campaign Targets Unpatched Systems Mar 1, 2018
-
China using big data to detain people before crime is committed Mar 1, 2018
-
How to Turn Off Facebook’s Face Recognition Features Mar 1, 2018
-
Single Sign-On authentication – the bug that lets you logon as someone else Mar 1, 2018
-
Self-proclaimed Bitcoin creator accused of $5 billion crypto heist Mar 1, 2018
-
Encryption 101: ShiOne ransomware case study Mar 1, 2018
-
This Guy Made a Facial Recognition Device for His Cat Mar 1, 2018
-
CannibalRAT targets Brazil Mar 1, 2018
-
How to Fight Mobile Number Port-out Scams Mar 1, 2018
-
RedDrop Malware Records Audio and Exfiltrates It to Cloud Storage Services Mar 1, 2018
-
China banned letter N from internet after people used it to attack Xi Jinping Mar 1, 2018
-
Malware Analysis Report: A new variant of Mobef Ransomware Mar 1, 2018
-
PS4-4.55-Kernel-Exploit: A fully implemented kernel exploit for the PS4 on 4.55FW Mar 1, 2018
-
Privilege Escalation in 2.3M WooCommerce Shops Mar 1, 2018
-
Honeytrap: Advanced Honeypot framework. Mar 1, 2018
-
Welcome to Indigo Defense! May 12, 2017
-
About Jan 1, 0001