Exploit Sellers Say There are More iPhone Hacks on the Market Than They’ve Ever Seen
There are caveats and the sellers are only a slice of the exploit market, but two exploit brokers say they’re seeing more iOS attacks now.
This Has Been the Worst Year for iPhone Security Yet
After several high profile attacks and embarrassing slip-ups, Apple’s perception as the secure consumer device is starting to crack.
Google Says Malicious Websites Have Been Quietly Hacking iPhones for Years
It may be the biggest attack against iPhone users yet.
How to Stop Google Calendar Spam
Here is how to remove Google Calendar spam and stop it from happening again.
Freelance Site Fiverr Offers Illegal Private Spying Services
Fiverr removed a number of listings after Motherboard approached the company for comment.
The People Paid to Dox Airbnb Addresses
In response to a need to enforce short term rental legislation, an industry of companies has popped up tasked with finding the real addresses of Airbnbs and other properties.
Microsoft Contractors Listened to Xbox Owners in Their Homes
Multiple contractors working for Microsoft explain how they listened to audio captured by Xbox consoles.
Instagram Launches Bug Bounty for Apps that Steal User Data
On Wednesday, Facebook expanded beyond its bounties for third party apps stealing user data to also apply to Instagram.
Amazon’s Creepy Twitter PR Army Is Growing
Amazon now has dozens of apparent employees tweeting about how much they love the company. But even former employees are suspicious of the accounts.
Edward Ongweso Jr
We Asked Def Con Attendees Why People Are Still Getting Hacked
The cybersecurity industry is worth billions of dollars, and tens of thousands of people attend Black Hat and Def Con every year. So, are we getting any safer?
The change comes after Motherboard found that Microsoft hired contractors to listen to some Skype phone calls.
These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer
It looks like an Apple lightning cable. It works like an Apple lightning cable. But it will give an attacker a way to remotely tap into your computer.