The Law Comes for John McAfee

The Law Comes for John McAfee

Also not ideal: A Chinese-speaking hacker group has been caught repurposing an especially sneaky tool that was first disclosed years ago as part of a leak of the Italy-based Hacking Team spyware company.

The FBI Botched Its DNC Hack Warning in 2016—but Says It Won’t Next Time

The FBI Botched Its DNC Hack Warning in 2016—but Says It Won’t Next Time

"I see a key change in practice and emphasis, getting our special agents in charge keyed up to gain the full cooperation of potential victims," says Herrington, who says he's personally notified dozens of victims of hacking incidents over his career.

An Alexa Bug Could Have Exposed Your Voice History to Hackers

An Alexa Bug Could Have Exposed Your Voice History to Hackers

Check Point also suggests that a hacker might be able to access banking data history through the attack, but Amazon disputes this, saying that information is redacted in Alexa's responses.

Iranian Spies Accidentally Leaked Videos of Themselves Hacking

Iranian Spies Accidentally Leaked Videos of Themselves Hacking

They show the hackers accessing compromised Gmail and Yahoo Mail accounts to download their contents, as well as exfiltrating other Google-hosted data from victims.A screenshot from a leaked video of Iranian hackers demonstrating how to exfiltrate emails from a Yahoo account using the email management tool Zimbra.

A Deep Dive With the Weirdest Fishes in the Sea

A Deep Dive With the Weirdest Fishes in the Sea

But the Twilight Zone specimens that Rocha and his colleagues bring back to the California Academy of Sciences in San Francisco, including unique corals and fishes, are helping them piece together a snapshot of one of the weirdest habitats on Earth.

The Flimsy Veneer of Gigantic Advertisements

The Flimsy Veneer of Gigantic Advertisements

“The problem was that it took away the local identity and sense of place, since the images were mostly European or American,” he says.“It’s covering up,” Derksen says.

The Confessions of Marcus Hutchins, the Hacker Who Saved the Internet

The Confessions of Marcus Hutchins, the Hacker Who Saved the Internet

With the specter of the SUV fully exorcised from his mind, he rolled another spliff with the last of his weed, smoked it as he ate his burger, and then packed his bags for the airport, where he was scheduled for a first-class flight home to the UK.Hutchins was coming off of an epic, exhausting week at Defcon, one of the world's largest hacker conferences, where he had been celebrated as a hero.

Meet the Mad Scientist Who Wrote the Book on How to Hunt Hackers

Meet the Mad Scientist Who Wrote the Book on How to Hunt Hackers

And for a smaller core of cybersecurity practitioners within that massive readership, it’s become a kind of legend: the ur-narrative of a lone hacker hunter, a text that has inspired an entire generation of network defenders chasing their own anomalies through a vastly larger, infinitely more malicious internet.

Twitter Now Has Better Two-Factor Authentication, So Use It

Twitter Now Has Better Two-Factor Authentication, So Use It

Finally Twitter has relented, allowing you to get started with two-factor authentication straight from an authenticator app or Yubikey , no phone number required.To do so, go to Twitter on the web, and click Settings & Privacy > Account > Security > Two-Factor Authentication .

An iTunes Bug Let Hackers Spread Ransomware

An iTunes Bug Let Hackers Spread Ransomware

The hacker apparently got in through a bug in forum software vBulletin; the Dutch Broadcast Foundation reports that the hacker has attempted to sell the data online.But he also took the time to comb through the malware's code, and stole a database full of decryption keys from the hacking group's server.

Planting Tiny Spy Chips in Hardware Can Cost as Little as $200

Planting Tiny Spy Chips in Hardware Can Cost as Little as $200

More than a year has passed since Bloomberg Businessweek grabbed the lapels of the cybersecurity world with a bombshell claim: that Supermicro motherboards in servers used by major tech firms, including Apple and Amazon, had been stealthily implanted with a chip the size of a rice grain that allowed Chinese hackers to spy deep into those networks.

After Six Years in Exile, Edward Snowden Explains Himself

After Six Years in Exile, Edward Snowden Explains Himself

But for the former NSA contractor and many of his generation, that idea of the internet is a foundational myth, enshrined in Neal Stephenson novels and in “The Hacker Manifesto”—both of which Snowden describes reading as a teenager in a mononucleosis haze—and John Perry Barlow’s “Declaration of the Independence of Cyberspace ,” which he writes that he holds in his memory next to the preamble to the Constitution.

How Twitter CEO Jack Dorsey's Account Was Hacked

How Twitter CEO Jack Dorsey's Account Was Hacked

Jack Dorsey’s ongoing mission to increase the civility of public discourse suffered a setback Friday, when an anonymous hacker took over his Twitter account for 20 minutes and retweeted @taytaylov3r’s claim that “nazi germany did nothing wrong.”.

Arctic Plastic Pollution, a Hacker Joke Gone Awry, and More News

Arctic Plastic Pollution, a Hacker Joke Gone Awry, and More News

Arctic Plastic Pollution, a Hacker Joke Gone Awry, and More News.Microplastics are reaching every corner of the earth, a hacker's joke cost him over $12,000, and WIRED takes a look at the science of dick pics.

DejaBlue: New BlueKeep-Style Bugs Mean You Need to Update Windows Now

DejaBlue: New BlueKeep-Style Bugs Mean You Need to Update Windows Now

Microsoft today warned Windows users of seven new vulnerabilities in Windows that, like BlueKeep, can be exploited via RDP, a tool that lets administrators connect to other computers in a network.

Watch a Drone Take Over a Nearby Smart TV

Watch a Drone Take Over a Nearby Smart TV

At the Defcon hacker conference today, independent security researcher Pedro Cabrera showed off in a series of hacking proofs-of-concept attacks how modern TVs—and particularly Smart TVs that use the internet-connected HbbTV standard implemented in his native Spain, across Europe, and much of the rest of the world—remain vulnerable to hackers.

A Remote-Start App Exposed Thousands of Cars to Hackers

A Remote-Start App Exposed Thousands of Cars to Hackers

Based on a scan of MyCar's exposed database—and Jmaxxz says he was careful not to access anyone else's private data—he estimates that there were roughly 60,000 cars left open to theft by those security bugs, with enough exposed data for a hacker to even choose the make and model of the car they wanted to steal.

This Teen Hacker Found Bugs in School Software That Exposed Millions of Records

This Teen Hacker Found Bugs in School Software That Exposed Millions of Records

In Follett's software, Demirkapi says he found bugs that would have given a hacker access to student data like grade point average, special education status, number of suspensions, and passwords.

New Google Gestures, the Capital One Hacker, and More News

New Google Gestures, the Capital One Hacker, and More News

The touchless phone-gestures of the future are here, the Capital One hacker didn't cover her tracks, and we've got some suggestions for cleaning up your air.

Trump's Cyber Czar Is Back—and He Wants to Make Hackers Suffer

Trump's Cyber Czar Is Back—and He Wants to Make Hackers Suffer

But you never stop to believe there's an adversary outside the window interfering with the beam between the remote and TV," says Ryan, who left the NSA two years ago to start work on Trinity before recruiting Bossert six months ago.

A $700 Million Amazon Pledge, Credit Card Hackers, and More News

A $700 Million Amazon Pledge, Credit Card Hackers, and More News

A $700 Million Amazon Pledge, Credit Card Hackers, and More News. Amazon makes an expensive pledge to its workers, a hacker group hits 17,000 domains, and butt plugs are being used for scientific research. A card-skimming hacker group hit 17,000 domains and counting.

What Is Credential Dumping?

What Is Credential Dumping?

Credential dumping is so crucial to modern hacking operations, Serper says, that he finds in analyses of victim networks that it often precedes even the other basic moves hackers make after gaining access to a single computer, such as installing persistent malware that will survive if the user reboots the machine.

Myspace Employees Used to Spy on Users

Myspace Employees Used to Spy on Users

Motherboard reports week that in the golden age of Myspace, employees had access too and abused an administrative tool called Overlord.

Hackers Stole $40 Million From Binance Cryptocurrency Exchange

Hackers Stole $40 Million From Binance Cryptocurrency Exchange

It appears that hackers were able to compromise several high net worth accounts, whose bitcoin was kept in Binance’s so-called hot wallet—which unlike cold wallets are connected to the internet—and filch those funds in a single transaction.

The Strange Journey of an NSA Zero-Day Vulnerability—Into Multiple Enemies' Hands

The Strange Journey of an NSA Zero-Day Vulnerability—Into Multiple Enemies' Hands

Most notably, Symantec says the Chinese group's hacking had planted an NSA backdoor on the network of its victims using a zero-day vulnerability in Microsoft's Server Message Block or SMB software, also seemingly learned by studying the NSA's hacking tools.

Hackers Found a Freaky New Way to Kill Your Car

Hackers Found a Freaky New Way to Kill Your Car

Hacker Says He Can Remotely Kill Car Engines Via Compromised GPS Apps. According to security journalist Brian Krebs, the iLnkP2P software made by Shenzhen Yunni Technology is inside millions of different IoT devices, like doorbells, cameras, and baby monitors.

Mysterious Hackers Hid Their Swiss Army Spyware for 5 Years

Mysterious Hackers Hid Their Swiss Army Spyware for 5 Years

Shulmin says Kaspersky hasn't yet been able to connect TajMahal, named for a file the spyware uses to move stolen data off a victim's machine, to any known hacker groups with the usual methods of code-matching, shared infrastructure, or familiar techniques.

Facebook Exposed Data Again, but This Viral Cat Can Save Lives

Facebook Exposed Data Again, but This Viral Cat Can Save Lives

Facebook Exposed Data Again, but This Viral Cat Can Save Lives. Tech news you can use, in two minutes or less: Facebook exposed your personal data ... Researchers discovered that data from hundreds of millions of Facebook users was left unprotected once again, this time on Amazon's servers.

Holes in 4G and 5G Networks Could Let Hackers Track Your Location

Holes in 4G and 5G Networks Could Let Hackers Track Your Location

"Average consumers are at the risk of exposing their privacy to malicious third parties who sell location data and other private information." With the exception of the Piercer flaws, the vulnerabilities the researchers discovered would need to be fixed above the individual carrier level by the industry group GSMA, which oversees development of mobile data standards including 4G and 5G.

Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes

Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes

Analyzing more than 30,000 attempted breaches in 2018 the company says it detected across its customer base, Crowdstrike measured the time from hackers' initial moment of intrusion to when they began to expand their access, jumping to other machines or escalating their privileges within a victim network to gain more visibility and control.