Hacking

Hacking

Hackers Publish List of Phished Discord Credentials

The small list of around 2,500 login details acts a reminder to stay vigilant and use two-factor authentication.
Joseph Cox
a day ago
Hacking

No, You Don’t Need a Burner Phone at a Hacking Conference

Every year, infosec Twitter debates whether people should bring a burner phone to conferences like Def Con or Black Hat. Here’s why we think you don’t need to worry about that.
Lorenzo Franceschi-Bicchierai
2 days ago
Hacking

Researchers Easily Trick Cylance's AI-Based Antivirus Into Thinking Malware Is 'Goodware'

By taking strings from an online gaming program and appending them to malicious files, researchers were able to trick Cylance’s AI-based antivirus engine into thinking programs like WannaCry and other malware are benign.
Kim Zetter
2 days ago
Hacking

Someone Hacked My T-Mobile Account and T-Mobile Won’t Talk About It

Cell phone carriers still have a long way to go before making your accounts truly secure.
Lorenzo Franceschi-Bicchierai
2 days ago
Hacking

The One Company I Gave My Address To Won’t Delete It

I get packages delivered to friends and don’t have my name on my doorbell. But all of my work may have been undermined by a cheap mattress.
Joseph Cox
4 days ago
Hacking

A Sports App Spammed Push Notifications About a Bizarre, Violent Workplace Beef

Someone hijacked the American Hockey League’s app to send push notifications about throat punching and being owed $6,000.
Matthew Gault
7.11.19
Podcast

The Connection Between a Deadly Gunfight and Phone Location Data

In the span of six seconds and 20 gunshots and three dead bodies hit the ground of a Nissan dealership in Texas. And somebody was tracking one of their cell phones remotely.
Motherboard Staff
7.11.19
Hacking

The Most Clever 'Zip Bomb' Ever Made Explodes a 46MB File to 4.5 Petabytes

Files so deeply compressed that they’re effectively malware have been around for decades—and a researcher just unveiled a brand-new Zip bomb that explodes a 46-megabyte file to 4.5 petabytes of data.
Ernie Smith
7.10.19
Hacking

How To Remove Zoom From Your Mac

Here’s how to disable the security and privacy issues that lets an attacker hijack your Mac webcam through Zoom.
Lorenzo Franceschi-Bicchierai
7.9.19
Hacking

Zoom Vulnerability Lets Hackers Hijack Your Webcam

The security researcher who found the issues said it could be used in malicious adverts or phishing campaigns.
Joseph Cox
7.9.19
Hacking

Someone Is Spamming and Breaking a Core Component of PGP’s Ecosystem

A new wave of spamming attacks on a core component of PGP’s ecosystem has highlighted a fundamental weakness in the whole ecosystem.
Lorenzo Franceschi-Bicchierai
7.3.19
iran

Stuxnet, American Sanctions, and Cyberwar Are Legitimizing Iranian Internet Controls

The anxiety about cyberattacks and the perceived need for greater control in the wake of American economic sanctions has led to a loss of internet freedom in Iran.
Mahsa Alimardani
7.3.19
01147