The Weakest Link
What do Heartbleed, WannaCry, and million dollar iPhone bugs have in common?
While on the run from the feds, Kevin Mitnick stole the source code of the Motorola MicroTAC Ultralite, the most advanced cellphone at the time, with a few phone calls.
From Bangkok to New York, fraudsters have an established, underground market of selling dirt cheap rooms at 5 star hotels as well as international flights.
Doxing rivals, stealing each other’s files, and poking around Nintendo’s servers are all a normal part of the ballooning Nintendo Switch hacking and piracy scenes.
We’re living in the golden age of spyware and government hacking, with companies rushing to join a blossoming billion dollar market. The weakest among us—activists or journalists—will suffer the consequences if we don’t regulate it appropriately.
Welcome to Motherboard's third annual hacking week.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to.
From SIM-jacking, to SS7, to dodgy telco data selling, for some people an iPod may be a better security decision than using a normal phone.