cybersecurity

tech-science

How Humans Will Bring the Internet to Space

In the future, orbiters, rovers, deep space probes, and even human space habitats will be nodes on the internet of things.
Becky Ferreira
7.3.19
tech-social-media

When Myspace Was King, Employees Abused a Tool Called ‘Overlord’ to Spy on Users

Several employees were caught abusing the tool, which let them read users’ messages and passwords.
Joseph Cox
6.25.19
Social Media

After Wave of Complaints, Instagram Tests New Methods to Recover Hacked Accounts

Motherboard previously reported how hackers were holding high-profile Instagram accounts to ransom, and how some influencers had to turn to white-hat hackers for help.
Joseph Cox
6.17.19
tech-social-media

Snapchat Employees Abused Data Access to Spy on Users

Multiple sources and emails also describe SnapLion, an internal tool used by various departments to access Snapchat user data.
Joseph Cox
5.23.19
Hacking

Infamous Forum For Instagram Hackers Gets Hacked by Other Hackers

Hackers hacked the OGUSERS forum and published its database in another hacker forum.
Lorenzo Franceschi-Bicchierai
5.19.19
Hacking

Israel Bombing ‘Cyber Operatives’ Isn’t Cyber War, It’s Just War

Experts in cybersecurity and conflict warn that it’s too early to draw dramatic conclusions about Israel’s strike against the alleged Hamas cyber headquarters.
Lorenzo Franceschi-Bicchierai
Ben Makuch
5.6.19
CYBER

How a Hacker Tracked Thousands of Cars and Gained the Ability To Kill Their Engines

In this week’s CYBER podcast, we spoke about Motherboard’s scoop on a hacker who breached two GPS tracking companies.
MOTHERBOARD STAFF
4.30.19
News

This Spyware Data Leak Is So Bad We Can't Even Tell You About It

A consumer spyware vendor left a lot of incredibly sensitive and private data, including intimate pictures and private call recordings, for all to see on a server freely accessible over the internet. And it still hasn’t taken the data down.
Lorenzo Franceschi-Bicchierai
3.25.19
Hacking

The Prototype iPhones That Hackers Use to Research Apple’s Most Sensitive Code

Very few people have heard of them, but "dev-fused" iPhones sold on the grey market are one of the most important tools for the best iOS hackers in the world.
Lorenzo Franceschi-Bicchierai
3.7.19
CYBER

How Hackers Break into iCloud-Locked iPhones

In this week’s episode of CYBER, Motherboard talks about the complex, underground industry of breaking into iCloud-locked iPhones, which brings together thieves, coders, and hackers from around the world.
Motherboard Staff
2.20.19
Hacking

Venezuela’s Government Appears To Be Trying to Hack Activists With Phishing Pages

Security researchers and activists exposed a brazen attempt to steal Venezuelan usernames and passwords for popular email and social media websites such as Gmail, Facebook, Microsoft Live, and Twitter.
Lorenzo Franceschi-Bicchierai
2.17.19
CYBER

How Google Tracks Hackers

This week, CYBER speaks to Shane Huntley, the Director of Google's Threat Analysis Group (TAG), essentially Google's hacker hunting team.
Motherboard Staff
2.12.19
0105