Arctic Plastic Pollution, a Hacker Joke Gone Awry, and More News

Arctic Plastic Pollution, a Hacker Joke Gone Awry, and More News

Arctic Plastic Pollution, a Hacker Joke Gone Awry, and More News.Microplastics are reaching every corner of the earth, a hacker's joke cost him over $12,000, and WIRED takes a look at the science of dick pics.

DejaBlue: New BlueKeep-Style Bugs Mean You Need to Update Windows Now

DejaBlue: New BlueKeep-Style Bugs Mean You Need to Update Windows Now

Microsoft today warned Windows users of seven new vulnerabilities in Windows that, like BlueKeep, can be exploited via RDP, a tool that lets administrators connect to other computers in a network.

Watch a Drone Take Over a Nearby Smart TV

Watch a Drone Take Over a Nearby Smart TV

At the Defcon hacker conference today, independent security researcher Pedro Cabrera showed off in a series of hacking proofs-of-concept attacks how modern TVs—and particularly Smart TVs that use the internet-connected HbbTV standard implemented in his native Spain, across Europe, and much of the rest of the world—remain vulnerable to hackers.

A Remote-Start App Exposed Thousands of Cars to Hackers

A Remote-Start App Exposed Thousands of Cars to Hackers

Based on a scan of MyCar's exposed database—and Jmaxxz says he was careful not to access anyone else's private data—he estimates that there were roughly 60,000 cars left open to theft by those security bugs, with enough exposed data for a hacker to even choose the make and model of the car they wanted to steal.

This Teen Hacker Found Bugs in School Software That Exposed Millions of Records

This Teen Hacker Found Bugs in School Software That Exposed Millions of Records

In Follett's software, Demirkapi says he found bugs that would have given a hacker access to student data like grade point average, special education status, number of suspensions, and passwords.

New Google Gestures, the Capital One Hacker, and More News

New Google Gestures, the Capital One Hacker, and More News

The touchless phone-gestures of the future are here, the Capital One hacker didn't cover her tracks, and we've got some suggestions for cleaning up your air.

Trump's Cyber Czar Is Back—and He Wants to Make Hackers Suffer

Trump's Cyber Czar Is Back—and He Wants to Make Hackers Suffer

But you never stop to believe there's an adversary outside the window interfering with the beam between the remote and TV," says Ryan, who left the NSA two years ago to start work on Trinity before recruiting Bossert six months ago.

A $700 Million Amazon Pledge, Credit Card Hackers, and More News

A $700 Million Amazon Pledge, Credit Card Hackers, and More News

A $700 Million Amazon Pledge, Credit Card Hackers, and More News. Amazon makes an expensive pledge to its workers, a hacker group hits 17,000 domains, and butt plugs are being used for scientific research. A card-skimming hacker group hit 17,000 domains and counting.

What Is Credential Dumping?

What Is Credential Dumping?

Credential dumping is so crucial to modern hacking operations, Serper says, that he finds in analyses of victim networks that it often precedes even the other basic moves hackers make after gaining access to a single computer, such as installing persistent malware that will survive if the user reboots the machine.

Myspace Employees Used to Spy on Users

Myspace Employees Used to Spy on Users

Motherboard reports week that in the golden age of Myspace, employees had access too and abused an administrative tool called Overlord.

Hackers Stole $40 Million From Binance Cryptocurrency Exchange

Hackers Stole $40 Million From Binance Cryptocurrency Exchange

It appears that hackers were able to compromise several high net worth accounts, whose bitcoin was kept in Binance’s so-called hot wallet—which unlike cold wallets are connected to the internet—and filch those funds in a single transaction.

The Strange Journey of an NSA Zero-Day Vulnerability—Into Multiple Enemies' Hands

The Strange Journey of an NSA Zero-Day Vulnerability—Into Multiple Enemies' Hands

Most notably, Symantec says the Chinese group's hacking had planted an NSA backdoor on the network of its victims using a zero-day vulnerability in Microsoft's Server Message Block or SMB software, also seemingly learned by studying the NSA's hacking tools.

Hackers Found a Freaky New Way to Kill Your Car

Hackers Found a Freaky New Way to Kill Your Car

Hacker Says He Can Remotely Kill Car Engines Via Compromised GPS Apps. According to security journalist Brian Krebs, the iLnkP2P software made by Shenzhen Yunni Technology is inside millions of different IoT devices, like doorbells, cameras, and baby monitors.

Mysterious Hackers Hid Their Swiss Army Spyware for 5 Years

Mysterious Hackers Hid Their Swiss Army Spyware for 5 Years

Shulmin says Kaspersky hasn't yet been able to connect TajMahal, named for a file the spyware uses to move stolen data off a victim's machine, to any known hacker groups with the usual methods of code-matching, shared infrastructure, or familiar techniques.

Facebook Exposed Data Again, but This Viral Cat Can Save Lives

Facebook Exposed Data Again, but This Viral Cat Can Save Lives

Facebook Exposed Data Again, but This Viral Cat Can Save Lives. Tech news you can use, in two minutes or less: Facebook exposed your personal data ... Researchers discovered that data from hundreds of millions of Facebook users was left unprotected once again, this time on Amazon's servers.

Holes in 4G and 5G Networks Could Let Hackers Track Your Location

Holes in 4G and 5G Networks Could Let Hackers Track Your Location

"Average consumers are at the risk of exposing their privacy to malicious third parties who sell location data and other private information." With the exception of the Piercer flaws, the vulnerabilities the researchers discovered would need to be fixed above the individual carrier level by the industry group GSMA, which oversees development of mobile data standards including 4G and 5G.

Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes

Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes

Analyzing more than 30,000 attempted breaches in 2018 the company says it detected across its customer base, Crowdstrike measured the time from hackers' initial moment of intrusion to when they began to expand their access, jumping to other machines or escalating their privileges within a victim network to gain more visibility and control.

Hackers Are Passing Around a Megaleak of 2.2 Billion Records

Hackers Are Passing Around a Megaleak of 2.2 Billion Records

Now, it seems, someone has cobbled together those breached databases and many more into a gargantuan, unprecedented collection of 2.2 billion unique usernames and associated passwords, and is freely distributing them on hacker forums and torrents, throwing out the private data of a significant fraction of humanity like last year's phone book.

Nest Cams Hijacked in the Name of PewDiePie and North Korea Pranks

Nest Cams Hijacked in the Name of PewDiePie and North Korea Pranks

Then they heard a hacker's voice on their Nest cameras saying, "I’m going to kidnap your baby, I’m in your baby’s room." For years, Internet of Things security woes have been epitomized by hackers accessing live feeds from video baby monitors.

The Teens Who Hacked Microsoft's Xbox Empire—And Went Too Far

The Teens Who Hacked Microsoft's Xbox Empire—And Went Too Far

There was one hacker, however, who lucked into a mother lode of 360 dev kits and whose eagerness to profit off his good fortune would help Pokora ascend to the top of the Xbox scene.Meet the cast of characters behind the Xbox Underground.Gifted Canadian hacker and the brains of the Xbox Underground.Programmer who made millions by tricking FIFA Soccer into minting virtual coins.Australian teenage hacker who turned reckless as the FBI closed in.Pokora's friend in Delaware, arrested in 2010 for trying to steal a game's source code.Abruptly vanished from the Xbox hacking scene, causing widespread paranoia.Owner of a hacked modem that he used to help the Xbox Underground steal software.III.

Why a Hacker Exploited Printers to Make PewDiePie Propaganda

Why a Hacker Exploited Printers to Make PewDiePie Propaganda

A self-described “huge” PewDiePie fan and university student says they exploited tens of thousands of internet-connected printers earlier this week to spit out a message telling people, in part, “PewDiePie is in trouble and he needs your help to defeat T-Series!” The incident was first reported by The Verge.

DoJ Charges North Korean Hacker for Sony, WannaCry, and More

DoJ Charges North Korean Hacker for Sony, WannaCry, and More

And while it highlights Sony, WannaCry, and the Bangladesh bank theft, it makes clear that the hacker’s activity extended far beyond those blockbuster incidents—and that it continues today.“The scope and damage of the computer intrusions perpetrated and caused by the subjects of this investigation, including Park, is virtually unparalleled,” reads the complaint.While the complaint singles out Park, prosecutors were also very clear that he did not act alone–an unsurprising fact given the magnitude of the operations.