What Does Amazon's 'Top Brand' Badge Actually Mean?

What Does Amazon's 'Top Brand' Badge Actually Mean?

Louise Matsakis covers Amazon, internet law, and online culture for WIRED.James Thomson, a former Amazon employee and a partner at Buy Box Experts, a firm that consults with independent Amazon sellers, says Top Brands likely have high sales volumes and high conversion rates, meaning a lot of people who look at their product listings ultimately choose to buy from them.

Election Systems Are Even More Vulnerable Than We Thought

Election Systems Are Even More Vulnerable Than We Thought

But a group of security researchers told Motherboard this week they found what look like election infrastructure online in 10 states, including swing states like Wisconsin, Michigan, and Florida.

Facial Recognition Is Suddenly Everywhere. Should You Worry?

Facial Recognition Is Suddenly Everywhere. Should You Worry?

Three US cities, including San Francisco , recently blocked their agencies from using the technology altogether, while federal lawmakers from both sides of the aisle have expressed interest in regulating facial recognition.#facial recognition #Artificial Intelligence #algorithms #privacy.

An Operating System Bug Exposes 200 Million Critical Devices

An Operating System Bug Exposes 200 Million Critical Devices

But the Armis researchers, who first disclosed their findings to Wind River in March, say that the patching process will be long and difficult, as is often the case with IoT and critical infrastructure updates .

Equifax Might Owe You $125. Here's How to Get It

Equifax Might Owe You $125. Here's How to Get It

They've negotiated a settlement with Equifax that entitles all victims to 10 years of free credit monitoring, or $125. This (unfortunately) could actually come in handy, given that Social Security numbers taken from Equifax are starting to show up on the dark web, and consumers have already suffered identity theft related to the breach, according to Pennsylvania attorney general Josh Shapiro.

What Is Credential Dumping?

What Is Credential Dumping?

Credential dumping is so crucial to modern hacking operations, Serper says, that he finds in analyses of victim networks that it often precedes even the other basic moves hackers make after gaining access to a single computer, such as installing persistent malware that will survive if the user reboots the machine.

Cellebrite Now Says It Can Unlock Any iPhone for Cops

Cellebrite Now Says It Can Unlock Any iPhone for Cops

Cellebrite, too, has likely possessed the ability to unlock iOS 12.3 devices prior to this announcement, says Dan Guido, the founder of the New York-based security firm Trail of Bits and a longtime iOS-focused security researcher.

A Push to Protect Political Campaigns from Hackers Hits a Snag

A Push to Protect Political Campaigns from Hackers Hits a Snag

Now, the United States Federal Election Commission may apply the same laws to block a cybersecurity firm from offering free or low-cost defense services to campaigns, at a time when those protections are badly needed .During the 2016 US presidential election, Russian hackers not only threatened election networks and voting systems, but wreaked havoc by targeting campaigns and political parties, particularly the Democratic National Committee, and leaking troves of sensitive data.

Military vs. Wind Farms, Facebook vs. Fake Accounts, and More News

Military vs. Wind Farms, Facebook vs. Fake Accounts, and More News

The military is decidedly not here for wind farms, Facebook busted up more fake news accounts, and we have some advice for your next poo. The military is locked in a struggle with wind farms. Facebook banned more fake accounts.

Microsoft’s First Windows XP Patch in Years Is a Very Bad Sign

Microsoft’s First Windows XP Patch in Years Is a Very Bad Sign

There’s maybe no better sign of a vulnerability’s severity; the last time Microsoft bothered to make a Windows XP fix publicly available was a little over two years ago, in the months before the WannaCry ransomware attack swept the globe .

How Hackers Broke WhatsApp With Just a Phone Call

How Hackers Broke WhatsApp With Just a Phone Call

But a new Financial Times report alleges that the notorious Israeli spy firm NSO Group developed a WhatsApp exploit that could inject malware onto targeted phones—and steal data from them—simply by calling them.

The Woman Who Saved John McAfee from an Epically Bad Deal

The Woman Who Saved John McAfee from an Epically Bad Deal

In 1989, 22-year-old Sonja Hoel had been working as an analyst at the venture capital firm TA Associates in Boston for several weeks—yet she still didn’t have a chair for her desk.

US Is Forcing a Chinese Firm to Sell Gay Dating App Grindr

US Is Forcing a Chinese Firm to Sell Gay Dating App Grindr

The US government says a Chinese gaming company's ownership of gay dating app Grindr poses a national security risk, according to a report from Reuters.

Hackers Can Slip Invisible Malware into 'Bare Metal' Cloud Computers

Hackers Can Slip Invisible Malware into 'Bare Metal' Cloud Computers

"Once the firmware is infected, there’s really no way to know if it is still infected or to recover from it." Karsten Nohl, Security Research Labs In their experiments, Eclypsium's researchers would rent an IBM bare metal cloud server, and then make a harmless alteration to its BMC's firmware, simply changing one bit in its code.

Watch Samsung Unveil Its Next Galaxy Smartphones

Watch Samsung Unveil Its Next Galaxy Smartphones

Watch Samsung Unveil Its Next Galaxy Smartphones Joan Cros/NurPhoto/Getty Images If you’ve been following tech news over the past several weeks, then you’re probably already up to speed on what Samsung’s planning to announce at its Galaxy Unpacked event today.

A Worldwide Hacking Spree Uses DNS Trickery to Nab Data

A Worldwide Hacking Spree Uses DNS Trickery to Nab Data

Using a classic tactic to undermine data security as it moves across the web, hackers have grabbed sensitive data like login credentials and business details from telecoms, internet service providers, government organizations, and other institutions in the Middle East, North Africa, Europe, and North America.

The Year Cryptojacking Ate the Web

The Year Cryptojacking Ate the Web

For example, the cloud monitoring and defense firm RedLock said in February that Tesla's Amazon Web Services cloud infrastructure was running mining malware thanks to an inconspicuous, but extensive cryptojacking campaign.

Hacking Diplomatic Cables Is Expected. Exposing Them Is Not

Hacking Diplomatic Cables Is Expected. Exposing Them Is Not

It is news that they totally got caught, though," says Dave Aitel, a former NSA researcher who is now chief security technology officer at the secure infrastructure firm Cyxtera.In the attack Area 1 identified, hackers first breached the European communication network known as Coreu in April 2015, and actively exfiltrated data until last week.

Targeting Black Americans, Russia's IRA Exploited Racial Wounds

Targeting Black Americans, Russia's IRA Exploited Racial Wounds

But New Knowledge’s report, released Monday, shows a much more sustained and purposeful focus on black Americans—as the IRA went about instigating mistrust in law enforcement and political institutions, while cultivating seemingly authentic narratives of black pride.The report details how black Americans were among the most exploited online communities by the IRA, cataloging how the Russian firm developed an “expansive cross-platform media mirage” that specifically targeted black people by leveraging popular social media sites.

Watch Out for a Clever Touch ID Scam Hitting the App Store

Watch Out for a Clever Touch ID Scam Hitting the App Store

And when you do put your finger on the home button, there’s no extra prompt to confirm that you actually meant to."Crooks will often come up with clever ideas to bypass initial screening mechanisms."Jérôme Segura, MalwarebytesCobb compares the scenario to the early days of QR codes, when scanners had no built-in mechanisms to verify where that square of black squiggles would send you.

Where Did the 'Freedom From Facebook' Campaign Really Come From?

Where Did the 'Freedom From Facebook' Campaign Really Come From?

While Facebook’s head of global policy Monika Bickert spoke, protesters from a group called Freedom From Facebook, seated just behind her, held signs depicting Sheryl Sandberg and Mark Zuckerberg’s heads atop an octopus whose tentacles reached around the planet.Freedom From Facebook has garnered renewed attention this week, after The New York Times revealed that Facebook employed an opposition firm called Definers to fight the group.

Your Drone Can Give Cops a Surprising Amount of Your Data

Your Drone Can Give Cops a Surprising Amount of Your Data

One drone had the owner's credit card information stored in a database that law enforcement officials were then able to access.Watson and NIST aren’t the only digital experts tapping into this cache of personal information that's flying around on drones.

You’ve Heard of Outsourced Jobs, but Outsourced Pollution? It’s Real, and Tough to Tally Up.

You’ve Heard of Outsourced Jobs, but Outsourced Pollution? It’s Real, and Tough to Tally Up.

If you included all the global emissions produced in the course of making things like the imported steel used in London’s skyscrapers and cars, then Britain’s total carbon footprint has actually increased slightly over that time.“It’s a huge problem” said Ali Hasanbeigi, a research scientist and C.E.O. of Global Efficiency Intelligence, an energy and environmental consulting firm.