The Weakest Link
The Internet Has a Huge C/C++ Problem and Developers Don't Want to Deal With It
What do Heartbleed, WannaCry, and million dollar iPhone bugs have in common?
How Kevin Mitnick Stole the Source Code for the Best Cell Phone of 1992
While on the run from the feds, Kevin Mitnick stole the source code of the Motorola MicroTAC Ultralite, the most advanced cellphone at the time, with a few phone calls.
How Hackers Sell Luxury Hotel Rooms for Next to Nothing
From Bangkok to New York, fraudsters have an established, underground market of selling dirt cheap rooms at 5 star hotels as well as international flights.
Why Is Antivirus Software Still a Thing?
Antivirus has been around for more than 20 years. Do you still need it to protect yourself today?
Is It Safe to Share a Netflix or HBO Go Account?
The impulse behind our willingness to share our Netflix or HBO Go passwords with other people could be hardwired.
What Constant Surveillance Does to Your Brain
Technology is getting more adept at tracking our moves and anticipating our choices, and being watched all the time can make us feel anxious.
Inside the Messy, Dark Side of Nintendo Switch Piracy
Doxing rivals, stealing each other’s files, and poking around Nintendo’s servers are all a normal part of the ballooning Nintendo Switch hacking and piracy scenes.
It’s Amateur Hour in the World of Spyware and Victims Will Pay the Price
We’re living in the golden age of spyware and government hacking, with companies rushing to join a blossoming billion dollar market. The weakest among us—activists or journalists—will suffer the consequences if we don’t regulate it appropriately.
How to Securely Get Rid of Your Devices
How to clean out that drawer of old phones, laptops, and hard drives without having to worry about someone getting their hands on your data.
The Weakest Link in Cybersecurity Isn't Human, It’s the Infrastructure
Welcome to Motherboard's third annual hacking week.
How to Use an iPod Touch as a Secure Device Instead of a Phone
From SIM-jacking, to SS7, to dodgy telco data selling, for some people an iPod may be a better security decision than using a normal phone.
Introducing CYBER: A Hacking Podcast by Motherboard
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to.