What Really Caused Facebook's 500M-User Data Leak?

What Really Caused Facebook's 500M-User Data Leak?

Or was it the 419 million Facebook user records, including hundreds of millions of phone numbers, names, and Facebook IDs, scraped from the social network by bad actors before a 2018 Facebook policy change, that were exposed publicly and reported by TechCrunch in September 2019?

Encryption Has Never Been More Essential—or Threatened

Encryption Has Never Been More Essential—or Threatened

Five years ago today, WhatsApp completed our roll out of end-to-end encryption, which provides people all over the world with the ability to communicate privately and securely.

Facebook's ‘Red Team X’ Hunts Bugs Beyond the Social Network's Walls

Facebook's ‘Red Team X’ Hunts Bugs Beyond the Social Network's Walls

"Covid for us was really an opportunity to take a step back and evaluate how we’re all working, how things are going, and what might be next for the red team," Ionescu says.

Why France’s New Tech ‘Repairability Index’ Is a Big Deal

Why France’s New Tech ‘Repairability Index’ Is a Big Deal

Manufacturers selling these devices in France must give their products a score, or “repairability index,” based on a range of criteria, including how easy it is to take the product apart and the availability of spare parts and technical documents.

For Transplanted Tortoises, Who Lives and Who Dies?

For Transplanted Tortoises, Who Lives and Who Dies?

© Brad Shaffer The desert tortoise is protected under the Endangered Species Act. It’s been on the list as threatened since 1990.© Brad Shaffer Every animal, including human, has two sources of DNA.

A Windows Defender Vulnerability Lurked Undetected for 12 Years

A Windows Defender Vulnerability Lurked Undetected for 12 Years

The flaw, discovered by researchers at the security firm SentinelOne, showed up in a driver that Windows Defender—renamed Microsoft Defender last year—uses to delete the invasive files and infrastructure that malware can create.

How Healthy is the Ocean? Technology and Big Data Have the Answer

How Healthy is the Ocean? Technology and Big Data Have the Answer

How TNC is leading the way on applying technology to protect fisheries in the digital age Balancing a thriving fishing industry with ocean health presents a growing challenge.

The NSA Warns That Russia Is Attacking Remote Work Platforms

The NSA Warns That Russia Is Attacking Remote Work Platforms

In an advisory today, the National Security Agency said that Russian state-sponsored groups have been actively attacking a vulnerability in multiple enterprise remote-work platforms developed by VMware.

This ‘Magical Bug’ Exposed Any iPhone in a Hacker's Wi-Fi Range

This ‘Magical Bug’ Exposed Any iPhone in a Hacker's Wi-Fi Range

The genius of the attack, though, is that the bug was exploitable through an iPhone's Wi-Fi features, meaning that an attacker just needed some antennas and adapters to launch the assault whenever they chose, compromising any nearby iOS device.

A Facebook Messenger Flaw Could Have Let Hackers Listen In

A Facebook Messenger Flaw Could Have Let Hackers Listen In

Discovered by Natalie Silvanovich of Google's Project Zero bug hunting team , the vulnerability, which is now patched, could have been exploited on Messenger for Android if an attacker simultaneously called a target and sent them a specially crafted, invisible message to trigger the attack.

Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography

Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography

In 2018, Aayush Jain, a graduate student at the University of California, Los Angeles, traveled to Japan to give a talk about a powerful cryptographic tool he and his colleagues were developing.

A Possible Covid Vaccine Means It's Time to Fix Cold Chains

A Possible Covid Vaccine Means It's Time to Fix Cold Chains

But turn the challenges on their head and, given that most of the technologies deployed today will still be in operation for years to come, the Covid-19 global immunization effort could offer us a once-in-a lifetime opportunity to create sustainable and resilient health cold-chain systems, including for ultra-low temperatures.

Want to Fight the Zombie Fire Apocalypse? Weaponize Math

Want to Fight the Zombie Fire Apocalypse? Weaponize Math

“The magic of cellular automata is that by aggregating very simple rules in a space, it actually is able to capture what is called an ‘emergent behavior,’ which is a behavior that is extremely complex,” says Imperial College London engineer Guillermo Rein, coauthor of a new paper describing the work in the journal Proceedings of the Combustion Institute.

Quantum Computing Is Bigger Than Donald Trump

Quantum Computing Is Bigger Than Donald Trump

But what the hearing was really about was our continuing inability to figure out what to do with a technological infrastructure that gives every single person on the planet the ability to broadcast their thoughts, whether illuminating or poisonous.

Apple's T2 Security Chip Has an Unfixable Flaw

Apple's T2 Security Chip Has an Unfixable Flaw

A recently released tool is letting anyone exploit an unusual Mac vulnerability to bypass Apple's trusted T2 security chip and gain deep system access.

Activists at Amazon Say Its Climate Efforts Still Fall Short

Activists at Amazon Say Its Climate Efforts Still Fall Short

Amazon Employees for Climate Justice has demanded that the company commit to reaching zero carbon emissions by 2030, a far more ambitious agenda than the one Bezos announced last year.

Covid Vaccines in Phase III, New Risk Calculators, and More Coronavirus News

Covid Vaccines in Phase III, New Risk Calculators, and More Coronavirus News

More vaccines enter Phase III trials, researchers continue to learn about the long-term impacts of Covid-19, and risk calculation becomes increasingly difficult as the country reopens.New tools aim to help you calculate risk as cases rise and the country reopens.

Neuralink Is Impressive Tech, Wrapped in Musk Hype

Neuralink Is Impressive Tech, Wrapped in Musk Hype

The Neuralink picks up electrical signals—the “spikes” or “action potentials” that run the length of neurons when they’re activated, and signal the squirting of neurotransmitter chemicals across synapses.

A Critical Flaw Is Affecting Thousands of WordPress Sites

A Critical Flaw Is Affecting Thousands of WordPress Sites

Hackers are actively exploiting a vulnerability that allows them to execute commands and malicious scripts on websites running File Manager, a WordPress plugin with more than 700,000 active installations, researchers said on Tuesday.

Facebook's ‘Kill Switch’ Solves the Wrong Problem

Facebook's ‘Kill Switch’ Solves the Wrong Problem

The company was underlining how critical it is to provide trustworthy information during an election period, while simultaneously defending its ambivalent political ads policy, which allows politicians and parties to deliver misleading statements using Facebook’s powerful microtargeting tools.

A Former Uber Exec's Indictment Is a Warning Shot

A Former Uber Exec's Indictment Is a Warning Shot

The FTC demanded responses to written questions and required Uber to designate an officer to provide testimony under oath," US attorney for the Northern District of California David Anderson Sullivan said in remarks about the indictment.

Nanoinfluencers Are Slyly Barnstorming the 2020 Election

Nanoinfluencers Are Slyly Barnstorming the 2020 Election

This new culture of the partisan influencer, unsurprisingly coming to fruition in the US during the 2020 presidential election, underscores the challenges social media firms face in dealing with the sheer amount of propaganda flowing on their platforms.

An Alexa Bug Could Have Exposed Your Voice History to Hackers

An Alexa Bug Could Have Exposed Your Voice History to Hackers

Check Point also suggests that a hacker might be able to access banking data history through the attack, but Amazon disputes this, saying that information is redacted in Alexa's responses.

Microsoft Warns of a 17-Year-Old ‘Wormable’ Bug

Microsoft Warns of a 17-Year-Old ‘Wormable’ Bug

On top of all of that, says Check Point's head of vulnerability research Omri Herscovici, the Windows DNS bug can in some cases be exploited with no action on the part of the target user, creating a seamless and powerful attack.

Best Nintendo Switch Deals and Console Bundles (July 2020)

Best Nintendo Switch Deals and Console Bundles (July 2020)

Outside of retail holidays like Black Friday and Amazon Prime Day, there aren't a ton of great discounts on Nintendo's popular consoles, the Switch and Switch Lite.These days, if you’re buying a Switch, the New Nintendo Switch is the model to look for.

Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment

Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment

The agencies recommended security professionals immediately implement a patch to protect the devices from hacking techniques that could fully take control of the networking equipment, offering access to all the traffic they touch and a foothold for deeper exploitation of any corporate network that uses them.

Encryption-Busting EARN IT Act Advances in Senate

Encryption-Busting EARN IT Act Advances in Senate

The law enforcement operation lasted more than three months and was made possible through police access to a secure communications platform called EncroChat, which offered encrypted messaging, disappearing messages, and an emergency data wiping feature.

25 Last-Minute Father's Day Gifts on Sale Now

25 Last-Minute Father's Day Gifts on Sale Now

We already have a Father's Day Gift Guide if you're looking for ideas, but since time is running out, we hunted the web for deals on some of our favorite gear that might put a smile on your dad's face.

FDA Approves the First Commercial Coronavirus Tests in the US

FDA Approves the First Commercial Coronavirus Tests in the US

"The authorization of our diagnostic test for Covid-19 will help to protect patients and enable medical staff to respond swiftly to treat those who are ill and prevent the spread of infection," Thermo Fisher CEO Marc Casper said in a statement.

The Long Path out of the Vulnerability Disclosure Dark Ages

The Long Path out of the Vulnerability Disclosure Dark Ages

In 2003 security researcher Katie Moussouris was working at the enterprise security firm @stake —which would later be acquired by Symantec—when she spotted a bad flaw in an encrypted flash drive from Lexar.