Category: Security Latest

Iranian Hackers Tried to Give Hacked Trump Campaign Emails to Dems

Plus: The FBI dismantles the largest-ever China-backed botnet, the DOJ charges two men with a $243 million crypto theft, Apple’s MacOS Sequoia breaks cybersecurity tools, and more. This article has been indexed from Security Latest Read the original article: Iranian…

Your Phone Won’t Be the Next Exploding Pager

Thousands of beepers and two-way radios exploded in attacks against Hezbollah, but mainstream consumer devices like smartphones aren’t likely to be weaponized the same way. This article has been indexed from Security Latest Read the original article: Your Phone Won’t…

Walkie-Talkies Explode in New Attack on Hezbollah

In a second attack on Hezbollah members, two-way radios detonated around Lebanon on Wednesday, causing injuries and multiple deaths. This article has been indexed from Security Latest Read the original article: Walkie-Talkies Explode in New Attack on Hezbollah

Did a Chinese University Hacking Competition Target a Real Victim?

Participants in a hacking competition with ties to China’s military were, unusually, required to keep their activities secret, but security researchers say the mystery only gets stranger from there. This article has been indexed from Security Latest Read the original…

The Mystery of Hezbollah’s Deadly Exploding Pagers

At least eight people have been killed and more than 2,700 people have been injured in Lebanon by exploding pagers. Experts say the blasts point toward a supply chain compromise, not a cyberattack. This article has been indexed from Security…

The Mystery of Hezbollah’s Deadly Exploding Pagers

At least eight people have been killed and more than 2,700 people have been injured in Lebanon by exploding pagers. Experts say the blasts point towards a supply chain compromise, not a cyberattack. This article has been indexed from Security…

Elon Musk Is a National Security Risk

Musk’s now-deleted post questioning why no one has attempted to assassinate Joe Biden and Kamala Harris renews concerns over his work for the US government—and potential to inspire extremist violence. This article has been indexed from Security Latest Read the…

Apple’s New Passwords App May Solve Your Login Nightmares

Apple is launching its first stand-alone password manager app in iOS 18. Here’s what you need to know. This article has been indexed from Security Latest Read the original article: Apple’s New Passwords App May Solve Your Login Nightmares

Apple Vision Pro’s Eye Tracking Exposed What People Type

The Vision Pro uses 3D avatars on calls and for streaming. These researchers used eye tracking to work out the passwords and PINs people typed with their avatars. This article has been indexed from Security Latest Read the original article:…

What You Need to Know About Grok AI and Your Privacy

xAI’s generative AI tool, Grok AI, is unhinged compared to its competitors. It’s also scooping up a ton of data people post on X. Here’s how to keep your posts out of Grok—and why you should. This article has been…

Hackers Threaten to Leak Planned Parenthood Data

Plus: Kaspersky’s US business sold, Nigerian sextortion scammers jailed, and Europe’s controversial encryption plans return. This article has been indexed from Security Latest Read the original article: Hackers Threaten to Leak Planned Parenthood Data

The NSA Has a Podcast—Here’s How to Decode It

The spy agency that dared not speak its name is now the Joe Rogan of the SIGINT set. And the pod’s actually worth a listen. This article has been indexed from Security Latest Read the original article: The NSA Has…

Why It’s So Hard to Fully Block X in Brazil

With 20,000 internet providers across the country, the technical challenges of blocking X in Brazil mean some connections are slipping through the cracks. This article has been indexed from Security Latest Read the original article: Why It’s So Hard to…

We Hunted Hidden Police Signals at the DNC

Using special software, WIRED investigated police surveillance at the DNC. We collected signals from nearly 300,000 devices, revealing vulnerabilities for both law enforcement and everyday citizens alike. This article has been indexed from Security Latest Read the original article: We…

The US Navy Is Going All In on Starlink

The Navy is testing out the Elon Musk–owned satellite constellation to provide high-speed internet access to sailors at sea. It’s part of a bigger project that’s about more than just getting online. This article has been indexed from Security Latest…

Taylor Swift Concert Terror Plot Was Thwarted by Key CIA Tip

Plus: China-linked hackers infiltrate US internet providers, authorities crack down on a major piracy operation, and a ransomware gang claims attacks during the Paris Olympics. This article has been indexed from Security Latest Read the original article: Taylor Swift Concert…

Pavel Durov’s Arrest Leaves Telegram Hanging in the Balance

Durov has reportedly been detained in France over Telegram’s alleged failure to adequately moderate illegal content on the messaging app. His arrest sparked backlash and left some associates asking, what now? This article has been indexed from Security Latest Read…

Pavel Durov’s Arrest Leaves Telegram Hanging in the Balance

Durov has reportedly been detained in France over Telegram’s alleged failure to adequately moderate illegal content on the messaging app. His arrest sparked backlash and left some associates asking, what now? This article has been indexed from Security Latest Read…

The US Navy Has Run Out of Pants

Plus: The US intelligence community formally blames Iran for Trump campaign hack, aircraft-tracking platform FlightAware says a “configuration error” exposed sensitive user data, and more. This article has been indexed from Security Latest Read the original article: The US Navy…

When War Came to Their Country, They Built a Map

The Telegram channel and website Deep State uses public data and insider intelligence to power its live tracker of Ukraine’s ever-shifting front line. This article has been indexed from Security Latest Read the original article: When War Came to Their…

An AWS Configuration Issue Could Expose Thousands of Web Apps

Amazon has updated its instructions for how customers should more securely implement AWS’s traffic-routing service known as Application Load Balancer, but it’s not clear everyone will get the memo. This article has been indexed from Security Latest Read the original…

The Pentagon Is Planning a Drone ‘Hellscape’ to Defend Taiwan

The US Defense Department’s grand strategy for protecting Taiwan from a massive Chinese military offensive involves flooding the zone with thousands of drones. This article has been indexed from Security Latest Read the original article: The Pentagon Is Planning a…

The Slow-Burn Nightmare of the National Public Data Breach

Social Security numbers, physical addresses, and more—all available online. After months of confusion, leaked information from a background-check firm underscores the long-term risks of data breaches. This article has been indexed from Security Latest Read the original article: The Slow-Burn…

Your Gym Locker May Be Hackable

Security researchers say they’ve extracted digital management keys from select electronic lockers and revealed how they could be cloned. This article has been indexed from Security Latest Read the original article: Your Gym Locker May Be Hackable

The Hacker Who Hunts Video Game Speedrunning Cheaters

Allan “dwangoAC” has made it his mission to expose speedrunning phonies. At the Defcon hacker conference, he’ll challenge one record that’s stood for 15 years. This article has been indexed from Security Latest Read the original article: The Hacker Who…

ATM Software Flaws Left Piles of Cash for Anyone Who Knew to Look

Six vulnerabilities in ATM-maker Diebold Nixdorf’s popular Vynamic Security Suite could have been exploited to control ATMs using “relatively simplistic attacks.” This article has been indexed from Security Latest Read the original article: ATM Software Flaws Left Piles of Cash…

Computer Crash Reports Are an Untapped Hacker Gold Mine

One hacker solved the CrowdStrike outage mystery with simple crash reports, illustrating the wealth of detail about potential bugs and vulnerabilities those key documents hold. This article has been indexed from Security Latest Read the original article: Computer Crash Reports…

Tricky Web Timing Attacks Are Getting Easier to Use—and Abuse

New research shows how known techniques for finding weaknesses in websites are actually practical in uncovering vulnerabilities, for better or worse. This article has been indexed from Security Latest Read the original article: Tricky Web Timing Attacks Are Getting Easier…

Microsoft’s AI Can Be Turned Into an Automated Phishing Machine

Attacks on Microsoft’s Copilot AI allow for answers to be manipulated, data extracted, and security protections bypassed, new research shows. This article has been indexed from Security Latest Read the original article: Microsoft’s AI Can Be Turned Into an Automated…

Inside the Dark World of Doxing for Profit

From tricking companies into handing over victims’ personal data to offering violence as a service, the online doxing ecosystem is not just still a problem—it’s getting more extreme. This article has been indexed from Security Latest Read the original article:…

A Flaw in Windows Update Opens the Door to Zombie Exploits

A researcher found a vulnerability that would let hackers strategically downgrade a target’s Windows version to reexpose patched vulnerabilities. Microsoft is working on fixes for the issue. This article has been indexed from Security Latest Read the original article: A…

How Project 2025 Would Put US Elections at Risk

Experts say the “nonsensical” policy proposal, which largely aligns with Donald Trump’s agenda, would weaken the US agency tasked with protecting election integrity, critical infrastructure, and more. This article has been indexed from Security Latest Read the original article: How…

Can GPT-4o Be Trusted With Your Private Data?

OpenAI’s newest model is “a data hoover on steroids,” says one expert—but there are still ways to use it while minimizing risk. This article has been indexed from Security Latest Read the original article: Can GPT-4o Be Trusted With Your…

Can ChatGPT-4o Be Trusted With Your Private Data?

OpenAI’s newest model is “a data hoover on steroids,” says one expert—but there are still ways to use it while minimizing risk. This article has been indexed from Security Latest Read the original article: Can ChatGPT-4o Be Trusted With Your…

A Senate Bill Would Radically Improve Voting Machine Security

This year’s Intelligence Authorization Act would mandate penetration testing for federally certified voting machines and allow independent researchers to work on exposing vulnerabilities. This article has been indexed from Security Latest Read the original article: A Senate Bill Would Radically…

How Infostealers Pillaged the World’s Passwords

Infostealer malware is swiping millions of passwords, cookies, and search histories. It’s a gold mine for hackers—and a disaster for anyone who becomes a target. This article has been indexed from Security Latest Read the original article: How Infostealers Pillaged…

Stop X’s Grok AI From Training on Your Tweets

Plus: More Pegasus spyware controversy, a major BIOS controversy, and more of the week’s top security news. This article has been indexed from Security Latest Read the original article: Stop X’s Grok AI From Training on Your Tweets

Europe Is Pumping Billions Into New Military Tech

The European Commission is allocating €7.3 billion for defense research over the next seven years. From drones and tanks of the future to battleships and space intelligence, here’s what it funds. This article has been indexed from Security Latest Read…

At the Olympics, AI Is Watching You

A controversial new surveillance system in Paris foreshadows a future where there are too many CCTV cameras for humans to physically watch. This article has been indexed from Security Latest Read the original article: At the Olympics, AI Is Watching…

At The 2024 Summer Olympics, AI Is Watching You

A controversial new surveillance system in Paris foreshadows a future where there are too many CCTV cameras for humans to physically watch. This article has been indexed from Security Latest Read the original article: At The 2024 Summer Olympics, AI…

A Hacker ‘Ghost’ Network Is Quietly Spreading Malware on GitHub

Cybersecurity researchers have spotted a 3,000-account network on GitHub that is manipulating the platform and spreading ransomware and info stealers. This article has been indexed from Security Latest Read the original article: A Hacker ‘Ghost’ Network Is Quietly Spreading Malware…

This Machine Exposes Privacy Violations

A former Google engineer has built a search engine, WebXray, that aims to find illicit online data collection and tracking—with the goal of becoming “the Henry Ford of tech lawsuits.” This article has been indexed from Security Latest Read the…

The Pentagon Wants to Spend $141 Billion on a Doomsday Machine

The DOD wants to refurbish ICBM silos that give it the ability to end civilization. But these missiles are useless as weapons, and their other main purpose—attracting an enemy’s nuclear strikes—serves no end. This article has been indexed from Security…

Don’t Fall for CrowdStrike Outage Scams

Swindlers are spinning up bogus websites in an attempt to dupe people with “CrowdStrike support” scams following the security firm’s catastrophic software update. This article has been indexed from Security Latest Read the original article: Don’t Fall for CrowdStrike Outage…

Don’t Fall for CrowdStrike Outage Scams

Swindlers are spinning up bogus websites in an attempt to dupe people with “CrowdStrike support” scams following the security firm’s catastrophic software update. This article has been indexed from Security Latest Read the original article: Don’t Fall for CrowdStrike Outage…

How One Bad CrowdStrike Update Crashed the World’s Computers

A defective CrowdStrike kernel driver sent computers around the globe into a reboot death spiral, taking down air travel, hospitals, banks, and more with it. Here’s how that’s possible. This article has been indexed from Security Latest Read the original…

J.D. Vance Left His Venmo Public. Here’s What It Shows

The Republican VP nominee’s Venmo network reveals connections ranging from the architects of Project 2025 to enemies of Donald Trump—and the populist’s close ties to the very elites he rails against. This article has been indexed from Security Latest Read…

The US Supreme Court Kneecapped US Cyber Strategy

After the Supreme Court limited the power of federal agencies to craft regulations, it’s likely up to Congress to keep US cybersecurity policy intact. This article has been indexed from Security Latest Read the original article: The US Supreme Court…

Hackers Claim to Have Leaked 1.1 TB of Disney Slack Messages

A hacker group called “NullBulge” says it stole more than a terabyte of Disney’s internal Slack messages and files from nearly 10,000 channels in an apparent protest over AI-generated art. This article has been indexed from Security Latest Read the…

AT&T Paid a Hacker $370,000 to Delete Stolen Phone Records

A security researcher who assisted with the deal says he believes the only copy of the complete dataset of call and text records of “nearly all” AT&T customers has been wiped—but some risks may remain. This article has been indexed…

Spyware Users Exposed in Major Data Breach

Plus: The Heritage Foundation gets hacked over Project 2025, a car dealership software provider seems to have paid $25 million to a ransomware gang, and authorities disrupt a Russian bot farm. This article has been indexed from Security Latest Read…

The Sweeping Danger of the AT&T Phone Records Breach

Telecom giant AT&T says a major data breach has exposed the call and text records of “nearly all” of its customers, epitomizing the dire state of data security. This article has been indexed from Security Latest Read the original article:…

Google Is Adding Passkey Support for Its Most Vulnerable Users

Google is bringing the password-killing “passkey” tech to its Advanced Protection Program users more than a year after rolling them out broadly. This article has been indexed from Security Latest Read the original article: Google Is Adding Passkey Support for…

The $11 Billion Marketplace Enabling the Crypto Scam Economy

Deepfake scam services. Victim data. Electrified shackles for human trafficking. Crypto tracing firm Elliptic found all were available for sale on an online marketplace linked to Cambodia’s ruling family. This article has been indexed from Security Latest Read the original…

AI-Powered Super Soldiers Are More Than Just a Pipe Dream

The US military has abandoned its half-century dream of a suit of powered armor in favor of a “hyper enabled operator,” a tactical AI assistant for special operations forces. This article has been indexed from Security Latest Read the original…

Hackers Leaking Taylor Swift Tickets? Don’t Get Your Hopes Up

Plus: Researchers uncover a new way to expose CSAM peddlers, OpenAI suffered a secret cyberattack, cryptocurrency thefts jump in 2024, and Twilio confirms hackers stole 33 million phone numbers. This article has been indexed from Security Latest Read the original…