This Spreadsheet of ‘The Worst 25 Passwords’ Is Actually Malware
Hackers are getting meta.
Instagram Launches Bug Bounty for Apps that Steal User Data
On Wednesday, Facebook expanded beyond its bounties for third party apps stealing user data to also apply to Instagram.
Apple Will Give You $1 Million to Hack an iPhone
It's the biggest prize Apple has ever offered, and a sign of how much the iPhone's software vulnerabilities are worth on the black market.
These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer
It looks like an Apple lightning cable. It works like an Apple lightning cable. But it will give an attacker a way to remotely tap into your computer.
Clothing Resale Marketplace Poshmark Announces Data Breach
"We recently discovered that data from some Poshmark users was acquired by an unauthorized third party."
Why This Revenge Porn Activist Is Selling Nudes to Get to DEF CON
The "tits to DEF CON" campaign, led by Badass Army, has already raised more than $11,000.
After Wave of Complaints, Instagram Tests New Methods to Recover Hacked Accounts
Motherboard previously reported how hackers were holding high-profile Instagram accounts to ransom, and how some influencers had to turn to white-hat hackers for help.
Infamous Forum For Instagram Hackers Gets Hacked by Other Hackers
Hackers hacked the OGUSERS forum and published its database in another hacker forum.
Israel Bombing ‘Cyber Operatives’ Isn’t Cyber War, It’s Just War
Experts in cybersecurity and conflict warn that it’s too early to draw dramatic conclusions about Israel’s strike against the alleged Hamas cyber headquarters.
How a Hacker Tracked Thousands of Cars and Gained the Ability To Kill Their Engines
In this week’s CYBER podcast, we spoke about Motherboard’s scoop on a hacker who breached two GPS tracking companies.
This Spyware Data Leak Is So Bad We Can't Even Tell You About It
A consumer spyware vendor left a lot of incredibly sensitive and private data, including intimate pictures and private call recordings, for all to see on a server freely accessible over the internet. And it still hasn’t taken the data down.
The Prototype iPhones That Hackers Use to Research Apple’s Most Sensitive Code
Very few people have heard of them, but "dev-fused" iPhones sold on the grey market are one of the most important tools for the best iOS hackers in the world.