Forget Imposters. Among Us Is a Playground for Hackers

Forget Imposters. Among Us Is a Playground for Hackers

The crux of the game's security bugs, Sebree says, is that its servers aren't designed to validate information sent by the game client running on the players' computers, a basic safeguard against cheating in most popular PC games.

Feds Seize $1 Billion in Stolen Silk Road Bitcoins

Feds Seize $1 Billion in Stolen Silk Road Bitcoins

According to the IRS's criminal investigation unit, Individual X successfully hacked the Silk Road sometime between May of 2012 and April of 2013, stealing that abundance of drug money from the dark web site's bitcoin addresses before Ulbricht's downfall in October of 2013.

A Hacker Is Threatening to Leak Patients' Therapy Notes

A Hacker Is Threatening to Leak Patients' Therapy Notes

The health care and mental health services provider Vastaamo says it first began investigating a possible breach at the end of September, when a hacker contacted three of the organization's employees with extortion demands.

The Law Comes for John McAfee

The Law Comes for John McAfee

Also not ideal: A Chinese-speaking hacker group has been caught repurposing an especially sneaky tool that was first disclosed years ago as part of a leak of the Italy-based Hacking Team spyware company.

The FBI Botched Its DNC Hack Warning in 2016—but Says It Won’t Next Time

The FBI Botched Its DNC Hack Warning in 2016—but Says It Won’t Next Time

"I see a key change in practice and emphasis, getting our special agents in charge keyed up to gain the full cooperation of potential victims," says Herrington, who says he's personally notified dozens of victims of hacking incidents over his career.

A Former Uber Exec's Indictment Is a Warning Shot

A Former Uber Exec's Indictment Is a Warning Shot

The FTC demanded responses to written questions and required Uber to designate an officer to provide testimony under oath," US attorney for the Northern District of California David Anderson Sullivan said in remarks about the indictment.

The Attack That Broke Twitter Is Hitting Dozens of Companies

The Attack That Broke Twitter Is Hitting Dozens of Companies

Branching Out. As in the Twitter hack, the perpetrators don't appear to be state-sponsored hackers or foreign cybercrime organizations, but young, English-speaking hackers organizing on forums like the website and the chat service Discord, says Zack Allen, the director of threat intelligence at security firm ZeroFox, who has also worked with the industry group tracking the incidents.

An Alexa Bug Could Have Exposed Your Voice History to Hackers

An Alexa Bug Could Have Exposed Your Voice History to Hackers

Check Point also suggests that a hacker might be able to access banking data history through the attack, but Amazon disputes this, saying that information is redacted in Alexa's responses.

Russia Tested a Space Weapon Last Week

Russia Tested a Space Weapon Last Week

This week, WIRED broke the news of a Russian military intelligence hacking campaign that dates all the way back to December 2018.

Chinese Hackers Charged in Decade-Long Crime and Spying Spree

Chinese Hackers Charged in Decade-Long Crime and Spying Spree

Dong would research victims and how they might be exploited; Li did the dirty work of compromising the networks and exfiltrating the data.Not to mention a hit list that included multiple videogame and pharmaceutical companies, an educational software firm, Covid-19 research, and hundreds of other victims worldwide.

Who Pulled Off the Twitter Hack?

Who Pulled Off the Twitter Hack?

And we took a fresh look at an old debate: whether TikTok actually poses a security threat to the US.Russian hackers are targeting Covid-19 vaccine research .

Iranian Spies Accidentally Leaked Videos of Themselves Hacking

Iranian Spies Accidentally Leaked Videos of Themselves Hacking

They show the hackers accessing compromised Gmail and Yahoo Mail accounts to download their contents, as well as exfiltrating other Google-hosted data from victims.A screenshot from a leaked video of Iranian hackers demonstrating how to exfiltrate emails from a Yahoo account using the email management tool Zimbra.

The Twitter Hack Could Have Been Much Worse—and Maybe Was

The Twitter Hack Could Have Been Much Worse—and Maybe Was

While the internal Twitter tool does not appear to let admins tweet on behalf of users, it does seemingly let them change the associated email account, which would make it relatively easy to take over a handle.

A Deep Dive With the Weirdest Fishes in the Sea

A Deep Dive With the Weirdest Fishes in the Sea

But the Twilight Zone specimens that Rocha and his colleagues bring back to the California Academy of Sciences in San Francisco, including unique corals and fishes, are helping them piece together a snapshot of one of the weirdest habitats on Earth.

The Flimsy Veneer of Gigantic Advertisements

The Flimsy Veneer of Gigantic Advertisements

“The problem was that it took away the local identity and sense of place, since the images were mostly European or American,” he says.“It’s covering up,” Derksen says.

The Confessions of Marcus Hutchins, the Hacker Who Saved the Internet

The Confessions of Marcus Hutchins, the Hacker Who Saved the Internet

With the specter of the SUV fully exorcised from his mind, he rolled another spliff with the last of his weed, smoked it as he ate his burger, and then packed his bags for the airport, where he was scheduled for a first-class flight home to the UK.Hutchins was coming off of an epic, exhausting week at Defcon, one of the world's largest hacker conferences, where he had been celebrated as a hero.

Nintendo Confirms Some 160,000 Accounts Might've Been Hacked

Nintendo Confirms Some 160,000 Accounts Might've Been Hacked

Earlier today, Nintendo confirmed that a recent hacking attempt on its system compromised the login IDs and passwords of some 160,000 Nintendo Network ID accounts.

Amid Its Covid-19 Crisis, China Was Still Hacking Uighurs’ iPhones

Amid Its Covid-19 Crisis, China Was Still Hacking Uighurs’ iPhones

From as early as December of last year and continuing through March, Chinese hackers used so-called "watering hole" attacks to plant malware on the iPhones of Uighurs, according to new findings from the security firm Volexity.

This Map Shows the Global Spread of Zero-Day Hacking Techniques

This Map Shows the Global Spread of Zero-Day Hacking Techniques

But today, the global map of zero-day hacking has expanded far beyond the United States, Russia, and China, as more countries than ever buy themselves a spot on it.

Marriott Got Hacked. Yes, Again

Marriott Got Hacked. Yes, Again

Based on what we currently know, it's certainly not as bad as the 2018 breach, which not only comprised especially sensitive information like passport numbers but was also part of state-sponsored Chinese hacking campaign .

An Artist Used 99 Phones to Fake a Google Maps Traffic Jam

An Artist Used 99 Phones to Fake a Google Maps Traffic Jam

Soon enough, Weckert realized that it was the mass of people, or more specifically their smartphones, that had inadvertently tricked Google into seeing gridlock on an empty street.

Free Press Advocates Decry Cybercrime Charges Against Glenn Greenwald

Free Press Advocates Decry Cybercrime Charges Against Glenn Greenwald

The complaint goes to some lengths to emphasize that Greenwald was not initially a subject of the investigation into this alleged hacking group, but that an audio recording uncovered during a lawful search pointed to "direct participation of the journalist in criminal conduct."

Meet the Mad Scientist Who Wrote the Book on How to Hunt Hackers

Meet the Mad Scientist Who Wrote the Book on How to Hunt Hackers

And for a smaller core of cybersecurity practitioners within that massive readership, it’s become a kind of legend: the ur-narrative of a lone hacker hunter, a text that has inspired an entire generation of network defenders chasing their own anomalies through a vastly larger, infinitely more malicious internet.

Twitter Now Has Better Two-Factor Authentication, So Use It

Twitter Now Has Better Two-Factor Authentication, So Use It

Finally Twitter has relented, allowing you to get started with two-factor authentication straight from an authenticator app or Yubikey , no phone number required.To do so, go to Twitter on the web, and click Settings & Privacy > Account > Security > Two-Factor Authentication .

How Crime Scene Analysts Collect and Preserve Fingerprints

How Crime Scene Analysts Collect and Preserve Fingerprints

He demonstrated how to lift fingerprints off different surfaces, so they can be viewed under a microscope.“The first thing we want to consider is the surface itself,” Steiner says.Steiner uses a special white powder to gently dust fingerprints, making them visible to the human eye.

The First BlueKeep Mass Hacking Is Finally Here—but Don't Panic

The First BlueKeep Mass Hacking Is Finally Here—but Don't Panic

But this is the first instance where I’ve seen it being used on a mass scale," says Marcus Hutchins, a malware researcher for security firm Kryptos Logic who was one of the first to build a working proof-of-concept for the BlueKeep vulnerability.

Russian Hackers Are Still Targeting the Olympics

Russian Hackers Are Still Targeting the Olympics

Microsoft notes that the hackers, long believed to be working in the service of the Russian military intelligence agency known as the GRU, began their attacks on September 16, just ahead of reports that the Worldwide Anti-Doping Agency had found "inconsistencies" in Russian athletes' compliance with anti-doping standards, which may lead to the country's ban from the 2020 Tokyo Olympics, just as they were from the Pyeongchang Winter Games in 2018.

An iTunes Bug Let Hackers Spread Ransomware

An iTunes Bug Let Hackers Spread Ransomware

The hacker apparently got in through a bug in forum software vBulletin; the Dutch Broadcast Foundation reports that the hacker has attempted to sell the data online.But he also took the time to comb through the malware's code, and stole a database full of decryption keys from the hacking group's server.

Planting Tiny Spy Chips in Hardware Can Cost as Little as $200

Planting Tiny Spy Chips in Hardware Can Cost as Little as $200

More than a year has passed since Bloomberg Businessweek grabbed the lapels of the cybersecurity world with a bombshell claim: that Supermicro motherboards in servers used by major tech firms, including Apple and Amazon, had been stealthily implanted with a chip the size of a rice grain that allowed Chinese hackers to spy deep into those networks.

Iranian Hackers Targeted a US Presidential Candidate

Iranian Hackers Targeted a US Presidential Candidate

In a 30-day stretch during August and September, Microsoft saw hackers launch 2,700 attempts to identify specific target email accounts, including those belonging to current and former US government officials, journalists, and Iranians living outside Iran.