Facebook Stored Millions of Passwords in Plaintext—Change Yours Now

Facebook Stored Millions of Passwords in Plaintext—Change Yours Now

It just got even harder: On Thursday, following a report by Krebs on Security, Facebook acknowledged a bug in its password management systems that caused hundreds of millions of user passwords for Facebook, Facebook Lite , and Instagram to be stored as plaintext in an internal platform.

How Hackers Pulled Off a $20 Million Mexican Bank Heist

How Hackers Pulled Off a $20 Million Mexican Bank Heist

Loza emphasizes that while the attacks likely required extensive expertise and planning over months, or even years, they were enabled by sloppy and insecure network architecture within the Mexican financial system, and security oversights in SPEI, Mexico's domestic money transfer platform run by central bank Banco de México, also known as Banxico.

When Facebook Goes Down, Don't Blame Hackers

When Facebook Goes Down, Don't Blame Hackers

“If you’re a DDoS attacker and you’re trying for a big target, and you want to have a big impact, you would probably look for an organization or a brand that doesn’t have as much connectivity to begin with,” says Alex Henthorn-Iwane, vice president at network security firm ThousandEyes.

5G Is Coming for Real, but It Will Cost You

5G Is Coming for Real, but It Will Cost You

Verizon Wednesday announced what could be the first “real” mobile 5G service in the US, dubbed " 5G Ultra Wideband ." It’s scheduled to launch April 11 in " select areas " of Chicago and Minneapolis, as a $10 add-on to the carrier's existing unlimited plans; there will be no additional charge for the first three months.

Proposing a 'Declaration of Digital Independence'

Proposing a 'Declaration of Digital Independence'

There cannot be a decentralized social media network unless there are rules that are held in common among an arbitrarily large, open group of publishers and readers—for example, standards for types of content and protocols for transmitting and displaying it.

The road to recovery: Rebuilding the transport sector after a disaster

The road to recovery: Rebuilding the transport sector after a disaster

The recovery phase can be the impetus to reexamine vulnerable links in the transport network and address those deficiencies to help reduce future risks and strengthen the economic and physical resilience of people and infrastructure assets.

Inside the ‘Black Box’ of a Neural Network

Inside the ‘Black Box’ of a Neural Network

By inserting a postage-stamp image of a baseball, they found they could confuse the neural network into thinking a whale was a shark.

Game of Thrones Season 8 Trailer: HBO Plays to Its Meme Base

Game of Thrones Season 8 Trailer: HBO Plays to Its Meme Base

Game of Thrones Season 8 Trailer: HBO Plays to Its Meme Base This is the face of someone fixin' for a fight. The trailer for the eighth and final season of Game of Thrones dropped this morning and hoo boy is it a doozy.

An Alphabet Moonshot Wants to Store the Security Industry's Data

An Alphabet Moonshot Wants to Store the Security Industry's Data

The tool is a cloud platform on which companies can store their network intelligence data indefinitely, allowing them to use Google's search smarts to comb through logs and gain insight into emerging digital security threats.

US Hackers' Strike on Russian Trolls Sends a Message—but What Kind?

US Hackers' Strike on Russian Trolls Sends a Message—but What Kind?

Isolating one building I don't think is much of one." Cyber Command had, prior to the IRA's network shutdown, sent far more literal signals to the IRA staffers, as well as the hackers within the Russian military intelligence agency known as the GRU responsible for much of 2016's election interference.

Former FCC Chair Tom Wheeler Says the Internet Needs Regulation

Former FCC Chair Tom Wheeler Says the Internet Needs Regulation

WIRED: The FCC approved the Open Internet Order while you were chair, which imposed net neutrality as a check on the centralizing power of broadband networks. There are two basic concepts that I think are universal to both networks and platforms and that we need regulations to protect.

Holes in 4G and 5G Networks Could Let Hackers Track Your Location

Holes in 4G and 5G Networks Could Let Hackers Track Your Location

"Average consumers are at the risk of exposing their privacy to malicious third parties who sell location data and other private information." With the exception of the Piercer flaws, the vulnerabilities the researchers discovered would need to be fixed above the individual carrier level by the industry group GSMA, which oversees development of mobile data standards including 4G and 5G.

5G? 5 Bars? What the Signal Icons on Your Phone Actually Mean

5G? 5 Bars? What the Signal Icons on Your Phone Actually Mean

In every other country there’s no difference,” says Brendan Gill, CEO of OpenSignal, a company that collects independent data on carrier signal quality.

China Will Likely Corner the 5G Market—and the US Has No Plan

China Will Likely Corner the 5G Market—and the US Has No Plan

What’s new about China's massive deployment of fiber, both in its own territory and in its global market along its planned Belt and Road, is that China is likely to permit only 5G equipment made by Huawei and a handful of other Chinese companies to connect to that fiber.

Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes

Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes

Analyzing more than 30,000 attempted breaches in 2018 the company says it detected across its customer base, Crowdstrike measured the time from hackers' initial moment of intrusion to when they began to expand their access, jumping to other machines or escalating their privileges within a victim network to gain more visibility and control.

Sustainable Sea Cucumbers: Saving the “Gold Bars” of the Ocean

Sustainable Sea Cucumbers: Saving the “Gold Bars” of the Ocean

“The people within MENAR are saltwater people, they rely heavily on the sea, to the point that if their fish stocks collapse it would be a catastrophe,” says Pete Waldie , a coastal fisheries scientist with The Nature Conservancy’s Melanesia program .

Cybersecurity Workers Scramble to Fix a Post-Shutdown Mess

Cybersecurity Workers Scramble to Fix a Post-Shutdown Mess

Furloughed cybersecurity employees returned to expired software licenses and web encryption certificates, colleagues burned out from working on skeleton crews, and weeks-worth of unanalyzed network activity logs.

Sprint Sues AT&T, Proving ‘5G’ Is Still Meaningless

Sprint Sues AT&T, Proving ‘5G’ Is Still Meaningless

The four largest US mobile carriers have largely settled on the LTE, or "Long Term Evolution" standard for their 4G networks.

How to Watch the Grammys

How to Watch the Grammys

Don Emmert/Getty Images The bad news: The Grammy Awards show airing this Sunday has two things in common with the Super Bowl halftime show. The 61st annual Grammys airs on CBS, just like the Super Bowl.

There's No Good Reason to Trust Blockchain Technology

There's No Good Reason to Trust Blockchain Technology

(By this, I mean systems that use the blockchain data structure but don’t have the above three elements.) In general, they have some external limitation on who can interact with the blockchain and its features.

Neural Networks Need a Cookbook. Here Are the Ingredients

Neural Networks Need a Cookbook. Here Are the Ingredients

In 1989, computer scientists proved that if a neural network has only a single computational layer, but you allow that one layer to have an unlimited number of neurons, with unlimited connections between them, the network will be capable of performing any task you might ask of it.

Why Facebook's Banned 'Research' App Was So Invasive

Why Facebook's Banned 'Research' App Was So Invasive

In order to allow people with iPhones to participate, Facebook sidestepped the strict privacy rules imposed by Apple in its App Store by taking advantage of a business applications program designed for internal company use.

Private Messages Are the New (Old) Social Network

Private Messages Are the New (Old) Social Network

Morris, for example, sees posting something publicly to a Facebook feed as a yearning for interconnectedness, while a private messaging thread is a quest for what she calls attunement, a way to strengthen a bond between two people.

The Excruciating, Impossible Science of Airport Delays

The Excruciating, Impossible Science of Airport Delays

Because of the federal government shutdown, the airport didn’t have enough Transportation Security Administration agents and air traffic controllers; things slowed to a ground stop . “They insert buffer time in their schedules and ground operations,” says Bo Zou, a transportation engineer at the University of Illinois.

Facebook Cracks Down on Networks of Fake Pages and Groups

Facebook Cracks Down on Networks of Fake Pages and Groups

If a troll runs two fake news pages but only one of them violates Facebook’s policies, the company can’t take down the other until it breaks the rules as well.

For Women Job Seekers, Networking Like a Man Isn't Enough

For Women Job Seekers, Networking Like a Man Isn't Enough

“Quite frankly, most of the jobs are still male-dominated and therefore the kind of private information that's so important to help women get ahead isn't as important to men's advancement,” says Northwestern University data scientist Brian Uzzi, the lead author on the study.

Most Users Still Don't Know How Facebook Advertising Works

Most Users Still Don't Know How Facebook Advertising Works

(Eleven percent of respondents reported that they weren’t assigned any categories and told instead “You have no behaviors.”) Pew also asked participants about whether Facebook assigned them a political category, such as “liberal” or “conservative,” and any “multicultural affinity”—which Facebook says are groups of people “whose likes and other activity on Facebook suggest they’re interested in content relating to particular ethnic communities — African American, Hispanic American and Asian American.” There is no affinity classification for whites.

A Major Hacking Spree Gets Personal for German Politicians

A Major Hacking Spree Gets Personal for German Politicians

It's difficult to offer protection to the victims." Lukasz Olejnik, Oxford University The trove of leaked documents is massive, but early assessments indicate that it seems focused less on exposing state secrets than it does on revealing deeply personal information about its targets.

Tor Is Easier Than Ever. Time to Give It a Try

Tor Is Easier Than Ever. Time to Give It a Try

But in 2018 a slew of new offerings and integrations vastly expanded the available tools, making 2019 the year to finally try Tor. You may even end up using the network without realizing it."At the end of the day for Tor what we hope is that our technology becomes underlying, and everything else that happens online happens on top of it," says Isabela Bagueros, executive director of the Tor Project.

AT&T Says It Will (Kinda Sorta) Start Offering a 5G Network

AT&T Says It Will (Kinda Sorta) Start Offering a 5G Network

For now, though, AT&T's new network, dubbed 5G+, and a 5G home wireless network launched by Verizon in five cities in October, will be nowhere near that fast, and only be available in limited areas.AT&T says it will first offer its service in parts of Atlanta; Charlotte, North Carolina; Dallas; Houston; Indianapolis; Jacksonville, Florida; Louisville, Kentucky; New Orleans; Oklahoma City; Raleigh, North Carolina; San Antonio; and Waco, Texas.

More