A new report shows just how pervasive the technology is that lets police unlock smartphones . And make sure you set aside a few minutes this weekend to read the story of the Aurora Generator Test , a 2007 demonstration that showed just how dangerous hacking a grid can be.
And there's more! Every Saturday we round up the security and privacy stories that we didn’t break or report on in depth but think you should know about. Click on the headlines to read them, and stay safe out there.A Security Researcher May Have Broken Into Trump's Twitter Account
OK, well, honestly we've been struggling with this one. Earlier this week, Dutch security researcher Victor Gevers told De Volkskrant that he had recently accessed Donald Trump's Twitter account simply by guessing the password: maga2020! (With slightly different capitalization, this is also apparently the password for the Wi-Fi at Trump rallies.) Gevers says he tried to alert the Trump campaign, Twitter, and others but failed to get a response. A few days later, he says, he saw that Trump's Twitter account had added two-factor authentication, freezing him out. The White House flatly denied that any of this happened, and Twitter said it had "seen no evidence to corroborate this claim"—which is odd, given that it would presumably be able to see if the president's device had logged in from a new device … in Europe. Some other apparent inconsistencies soon came to light as well. But Gevers is highly respected, and it seems unlikely that he would make any of this up. So! It's all very strange. If you take anything away from it, though, it's to please put two-factor authentication on your own accounts .
A Spam Attack Dares to Mess With Among UsThe game of the moment is Among Us, especially after US representative Alexandria Ocasio-Cortez streamed it on a marathon three-hour Twitch session. Its high profile, though, appears to have attracted the attention of spammers as well, who this week flooded the game's chat feature with links to subscribe to a YouTube channel. Eurogamer spoke with the apparent perpetrators, who claim to have disrupted 1.5 million games as of Friday. Among Us developer Inner Sloth said it's working on containing the problem.The 25 Known Vulnerabilities Chinese Hackers Use the MostThe NSA this week shared a list of the 25 patchable vulnerabilities that Chinese hackers use most, in hopes that potential targets will actually, you know, patch them. A lot of the bugs provide a foothold on internal networks, useful for general espionage purposes. The vulnerabilities also aren't exclusively used by China; they're an entry point for all kinds of criminal activity, especially since they're all publicly detailed. Patch your systems, friends!
The Rise and Fall of Encrypted Phone Giant Phantom SecureMotherboard this week published a great investigative piece about Phantom Secure, a company that sold luxury encrypted phones to cartels and other criminal elements. No spoilers about what happens to the company and its founder, Vince Ramos, but trust us: It's a journey worth digging into.
Who Pulled Off the Twitter Hack?
- 📩 Want the latest on tech, science, and more? Sign up for our newsletters !
- The man who speaks softly—and commands a big cyber army
- Amazon wants to “win at games.” So why hasn’t it ?
- What forest floor playgrounds teach us about kids and germs
- Publishers worry as ebooks fly off libraries' virtual shelves
- 5 graphics settings worth tweaking in every PC game
- 🎮 WIRED Games: Get the latest tips, reviews, and more
- 🏃🏽♀️ Want the best tools to get healthy? Check out our Gear team’s picks for the best fitness trackers , running gear (including shoes and socks ), and best headphones