The Best Discord Bots for Your Server

The Best Discord Bots for Your Server

MEE6 facilitates moderation, custom commands (like answering frequently asked questions), and creating polls and can log activity on a Discord server relevant to moderators.For a premium fee of $12 per month, MEE6 offers more advanced custom commands (like letting you know when a streamer is live on Twitch) and moderation capabilities.

Why James Bond Doesn’t Use an iPhone

Why James Bond Doesn’t Use an iPhone

“Pegasus spyware would no doubt be used by adversaries to target James Bond if he were an iPhone user,” says Moore.

Everything Amazon Announced—Including a Cute Security Robot

Everything Amazon Announced—Including a Cute Security Robot

You’ll get professional monitoring, backup internet on all Ring devices, access to the Alexa Guard Plus helpline, and more robust online security using Eero Secure.Photograph: AmazonWorking with The Home Depot, Ring's new JobSite Security bundle aims to make it easier to monitor job sites.

How to Go Passwordless on Your Microsoft Account

How to Go Passwordless on Your Microsoft Account

You can replace your Microsoft account password with a code from the Microsoft Authenticator app, the Windows Hello biometric login system (usually facial or fingerprint recognition), a physical security key that you keep with you, or a verification code sent via email or text.

The iOS 15 Privacy Settings You Should Change Right Now

The iOS 15 Privacy Settings You Should Change Right Now

The technology has moved on in the past four years and with iOS 15 Apple is giving the option to hide your IP address from trackers.

The Biggest DDoS Attack in History Hit Russian Tech Giant Yandex

The Biggest DDoS Attack in History Hit Russian Tech Giant Yandex

The Russian tech giant Yandex said this week that in August and September it was hit with the internet's largest-ever recorded distributed denial-of-service or DDoS attack.

WhatsApp Fixes Its Biggest Encryption Loophole

WhatsApp Fixes Its Biggest Encryption Loophole

It’s a complex solution to a longstanding issue, and one that sets a precedent for companies that don’t want to rely quite so extensively on the security of the world’s handful of dominant cloud providers .“We’ve been working on this problem for many years and to build this, we had to develop an entirely new framework for key storage and cloud storage that can be used across the world’s largest operating systems,” says WhatsApp product manager Calvin Pappas.

BrakTooth Flaws Affect Billions of Bluetooth Devices

BrakTooth Flaws Affect Billions of Bluetooth Devices

The latest version, demonstrated this week, comes in new formats like Lightning to USB-C and USB-C to USB-C, has a wider range, and introduces geofencing features.

6 Things You Need to Do to Prevent Getting Hacked

6 Things You Need to Do to Prevent Getting Hacked

Even if you do have a password that’s easy to guess (we’ll get to that shortly), an attacker is unlikely to get access to an account with multi-factor authentication turned on unless they have your phone.

How to Log In to Your Devices Without Passwords

How to Log In to Your Devices Without Passwords

Screenshot: Microsoft via David NieldWindows Hello is the name Microsoft gives you password-free access to your computer: It can include facial recognition via a webcam, fingerprint scanning via a sensor, and the use of a short PIN code.

Encryption Has Never Been More Essential—or Threatened

Encryption Has Never Been More Essential—or Threatened

Five years ago today, WhatsApp completed our roll out of end-to-end encryption, which provides people all over the world with the ability to communicate privately and securely.

Homecoming Queen (and Her Mom) Arrested for Alleged Vote Hacking

Homecoming Queen (and Her Mom) Arrested for Alleged Vote Hacking

This week saw new revelations of election interference, both big and small: On one end of the spectrum, an alleged mother-daughter conspiracy to digitally rig a Florida high school's vote for homecoming queen.

Bitcoin’s Greatest Feature Is Also Its Existential Threat

Bitcoin’s Greatest Feature Is Also Its Existential Threat

Now the content-delivery network Akamai has reported on a new method: a botnet that uses the Bitcoin blockchain ledger.To be fair, not absolutely everyone who uses a blockchain holds a copy of the entire ledger.

Apple Offers Its Closest Look Yet at iOS and MacOS Security

Apple Offers Its Closest Look Yet at iOS and MacOS Security

This year's edition contains significantly expanded information about hardware like M1, new details about the secure enclave, and an accounting of a host of software features.Strafach wants to know more about how M1 chips securely handle booting other operating systems, always a question for jailbreakers when Apple releases new processors.

Apple Fixes One of the iPhone's Most Pressing Security Risks

Apple Fixes One of the iPhone's Most Pressing Security Risks

In response to Citizen Lab's research, Apple said in December that “iOS 14 is a major leap forward in security and delivered new protections against these kinds of attacks.”.

The Best VPNs to Protect Yourself Online

The Best VPNs to Protect Yourself Online

As long as WebRTC is enabled (and it is by default in most browsers), websites can view your actual IP address even when you use a VPN.Mullvad offers apps for every major platform (the Android app is in beta), as well as routers.

Fleeing WhatsApp for Better Privacy? Don't Turn to Telegram

Fleeing WhatsApp for Better Privacy? Don't Turn to Telegram

Mimoun, the founder of the digital security nonprofit Horizontal, asked the participants to list messaging platforms that they'd heard of or used, and they quickly rattled off Facebook Messenger , WhatsApp , Signal , and Telegram .

The SolarWinds Hackers Used Tactics Other Groups Will Copy

The SolarWinds Hackers Used Tactics Other Groups Will Copy

Once an attacker has the network privileges to manipulate this authentication scheme, they can generate legitimate tokens to access any of the organization's Microsoft 365 and Azure accounts, no passwords or multifactor authentication required.

Ex-CISA Head Chris Krebs: ‘Impeachment Is the Right Mechanism’

Ex-CISA Head Chris Krebs: ‘Impeachment Is the Right Mechanism’

As the director of the US Cybersecurity and Infrastructure Security Agency, Krebs oversaw the country's election preparedness , grappling not only with potential foreign hacking threats but a firehose of disinformation from President Donald Trump and his associates.

The SolarWinds Investigation Ramps Up

The SolarWinds Investigation Ramps Up

Now, after a federal career that many credited with helping to secure the 2020 presidential election from foreign interference, Krebs is venturing into the other massive cybersecurity story of the last year: the Russian hacker intrusion into SolarWinds , a Texas-based company whose software was hijacked and used to penetrate the networks of at least half a dozen federal agencies.

The DC Insurrection Lays Bare the Fiction of America

The DC Insurrection Lays Bare the Fiction of America

That fiction was on grand display Wednesday when a mob of President Trump’s supporters stormed the US Capitol as lawmakers were voting to confirm the presidential election results.It was photographed by Saul Loeb and depicts three rioters in repose.

The NSA Warns That Russia Is Attacking Remote Work Platforms

The NSA Warns That Russia Is Attacking Remote Work Platforms

In an advisory today, the National Security Agency said that Russian state-sponsored groups have been actively attacking a vulnerability in multiple enterprise remote-work platforms developed by VMware.

A Broken Piece of Internet Backbone Might Finally Get Fixed

A Broken Piece of Internet Backbone Might Finally Get Fixed

Today the group known as Mutually Agreed Norms for Routing Security is announcing a task force specifically dedicated to helping "content delivery networks" and other cloud services adopt the filters and cryptographic checks needed to harden BGP.

7 Simple Ways to Make Your Android Phone More Secure

7 Simple Ways to Make Your Android Phone More Secure

There are times when you will want to hand your unlocked phone to the people around you—showing photos to friends, for instance, or giving it to your kids to play on—and you may want to consider putting some extra locks on the apps you want to be more secure.

This Bluetooth Attack Can Steal a Tesla Model X in Minutes

This Bluetooth Attack Can Steal a Tesla Model X in Minutes

But one security researcher has shown how vulnerabilities in the Tesla Model X's keyless entry system allow a different sort of update: A hacker could rewrite the firmware of a key fob via Bluetooth connection, lift an unlock code from the fob, and use it to steal a Model X in just a matter of minutes.

Microsoft Is Making a Secure PC Chip—With Intel and AMD's Help

Microsoft Is Making a Secure PC Chip—With Intel and AMD's Help

For example, AMD says that its Security Processor will work alongside Pluton to act as the hardware root of trust for the silicon chips in a system and their firmware, while Pluton can provide the root of trust for Windows.

Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography

Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography

In 2018, Aayush Jain, a graduate student at the University of California, Los Angeles, traveled to Japan to give a talk about a powerful cryptographic tool he and his colleagues were developing.

At Least Election Day Didn't Melt Down

At Least Election Day Didn't Melt Down

"We are seeing historic levels of cooperation among federal agencies and state and local election officials to secure this election and to adapt to the Covid-19 pandemic," says Mark Lindeman, acting codirector of Verified Voting, a nonpartisan nonprofit that promotes election system integrity.

Did a Security Researcher Guess Trump’s Twitter Password?

Did a Security Researcher Guess Trump’s Twitter Password?

Earlier this week, Dutch security researcher Victor Gevers told De Volkskrant that he had recently accessed Donald Trump's Twitter account simply by guessing the password: maga2020!A few days later, he says, he saw that Trump's Twitter account had added two-factor authentication, freezing him out.

Apple's T2 Security Chip Has an Unfixable Flaw

Apple's T2 Security Chip Has an Unfixable Flaw

A recently released tool is letting anyone exploit an unusual Mac vulnerability to bypass Apple's trusted T2 security chip and gain deep system access.