All Blogs / Technology / Security / Popular


Mt. Gox victims hounded by hackers looking to cash in

If the collapse of Mt. Gox wasn't enough, users are now at risk of losing their investments a second, and final, time.

CVSS scores are not enough for modern cybersecurity defense

A new report takes a fresh look at how our vulnerability assessments measure up in today's world.

Researchers have found the most hackable countries on the internet

Millions of connected devices are exposed and viewable on the internet — and that puts some countries at a greater risk from hackers than others.

Mitsubishi Outlander Can Be Hacked Via WiFi

The hack allows activating of the climate control system and disabling the anti-theft alarm, among other functions.

The Next Evolution of Suits and Spooks: Entertainment

Farnborough International Airshow 2014 I founded Suits and Spooks in 2011 in an effort to make it easier for startup technology companies to engage with the Intelligence Community; a problem based largely back then on an antiquated acquisition system. Show More Summary

Threat Actors Employ COM Technology in Shellcode to Evade Detection

COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it is one of the fundamental architectures in Windows. From the security point of view, several “features” built into COM have lead to many security vulnerabilities. Show More Summary

Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript

This post was prepared with the invaluable assistance of Rahamathulla Hussain and Girish Kulkarni. During the last couple of weeks, McAfee Labs has observed a huge increase in spam related to Locky, a new ransomware threat spread via spam campaigns. Show More Summary

Tor Developer Jacob Appelbaum Resigns Amid Sex Abuse Claims

A Tor Project co-worker backs up claims of Appelbaum's sexual misconduct posted to an anonymous website and acknowledged by Tor's management. The post Tor Developer Jacob Appelbaum Resigns Amid Sex Abuse Claims appeared first on WIR...

TeamViewer confirms extent of hack 'significant'

The company said the hack was down to user "carelessness," but it seems the firm's careless use of words has caught up with it.

Hacker Lexicon: What Is the Digital Millennium Copyright Act?

The Digital Millennium Copyright Act is meant to protect copyright holders from illegal piracy, but its often broad application can stifle research and free speech. The post Hacker Lexicon: What Is the Digital Millennium Copyright Act? appeared first on WIRED.

Key Tor developer Jacob Appelbaum leaves amidst sexual misconduct claims

The allegations, now made public, have left the Tor Project "deeply troubled" -- but Appelbaum is not going down without a fight.

171 million VK.com accounts stolen by hackers, and now for sale

It's the latest in a string of historical hacks targeting large social networking sites.

Security News This Week: A Deluge of Mega-Breaches Dumps on the Dark Web

Each Saturday we round up the news stories that we didn’t break or cover in depth at WIRED, but which deserve your attention nonetheless. The post Security News This Week: A Deluge of Mega-Breaches Dumps on the Dark Web appeared first on WIRED.

The FBI’s Studying Prisoner Tattoos—And Pissing Off Privacy Hawks

Privacy advocates say a study that uses prisoner tattoos for detection purposes crosses the line. The post The FBI's Studying Prisoner Tattoos—And Pissing Off Privacy Hawks appeared first on WIRED.

GhostShell hacker leaks 39 million accounts in security "protest"

The databases contains critically-personal information, including names, email addresses, dates of birth, genders, and even social information.

Irongate malware targets industrial systems, avoids detection

The unusual malware has been specifically designed to target the core systems cities rely on.

2000 cuts with Binary Ninja

Using Vector35’s Binary Ninja, a promising new interactive static analysis and reverse engineering platform, I wrote a script that generated “exploits” for 2,000 unique binaries in this year’s DEFCON CTF qualifying round. If you’re wondering how to remain competitive in a post-DARPA DEFCON CTF, I highly recommend you take a look at Binary Ninja. Before […]

IT Admin Faces Felony for Deleting Files Under Flawed Hacking Law

A sysadmin's hacking charges--for deleting files he had authorized access to--raise new questions for the controversial Computer Fraud and Abuse Act. The post IT Admin Faces Felony for Deleting Files Under Flawed Hacking Law appeared first on WIRED.

Is $14,000 a Reasonable Tag for a "Secure" Smartphone?

The phone has been dubbed as the “Rolls Royce of smartphones” and uses a physical security touch for activation.

Copyright © 2015 Regator, LLC