All Blogs / Technology / Security / Popular


Uber went from 'god view' stalker to privacy buff in under two years

The EFF gave the company top marks in its latest "who has your back" report.

UK National Health Service fined over HIV patient data leak

The £180,000 fine covers the breach of the Data Protection Act, but will do little to comfort the victims.

Twitter bars spy agencies from analytics service that spots terror attacks

Twitter has cut off US intelligence from using a data miner able to rifle through user tweets without limit, a move likely to cause outrage in federal circles.

Security researcher arrested for disclosing US election website vulnerabilities

David Levin was later released on a $15,000 bond after reporting the SQL vulnerabilities.

Founder of underground bank Liberty Reserve sentenced to 20 years behind bars

Arthur Budovsky will be in his sixties when his sentence for money laundering through the online bank ends.

Security News This Week: Facebook’s Most Adorable Bug Bounty Yet

Each Saturday we round up the news stories that we didn’t break or cover in depth at WIRED, but which deserve your attention nonetheless. The post Security News This Week: Facebook's Most Adorable Bug Bounty Yet appeared first on WI...

Hacker Lexicon: Stingrays, the Spy Tool the Government Tried, and Failed, to Hide

A stingray is a controversial surveillance tool that impersonates a legitimate cell tower to trick mobile phones into connecting to them and revealing their location. The post Hacker Lexicon: Stingrays, the Spy Tool the Government Tried, and Failed, to Hide appeared first on WIRED.

Every Radiohead Album, Ranked in Its Right Place

Here's our ranking of the group's studio efforts; we understand if, after reading, you want to come at us with knives out. The post Every Radiohead Album, Ranked in Its Right Place appeared first on WIRED.

Flaw-ridden bloatware puts nearly every Lenovo PC at risk from hackers

A security flaw in software that's preinstalled on millions of Lenovo devices lets malware run at the system-level.

FireEye CEO steps down as profit plummets

FireEye CEO David DeWalt will be replaced by Kevin Mandia in the wake of poor financial results.

The DBIR’s ‘Forest’ of Exploit Signatures

If you follow the recommendations in the 2016 Verizon Data Breach Investigations Report (DBIR), you will expose your organization to more risk, not less. The report’s most glaring flaw is the assertion that the TLS FREAK vulnerability is among the ‘Top 10’ most exploited on the Internet. No experienced security practitioner believes that FREAK is […]

After mystery hack, millions of logins for sale on dark web

Almost 60 million users are affected, making it one of the largest hacks to date.

Security Best Practices for Azure App Service Web Apps, Part 2

This post was written by Piyush Mittal.  In our previous post on this topic, we learned how to configure custom domain names and certificates for web applications developed using Microsoft’s Azure App Service. Regardless of whether you...Show More Summary

Apple patches Xcode, fixes severe vulnerabilities

The tech giant has applied new security fixes for Xcode's git implementation.

Craig Wright Ends His Attempt to Prove He Created Bitcoin: ‘I’m Sorry’

On Thursday, he uploaded an apology to his web site. The post Craig Wright Ends His Attempt to Prove He Created Bitcoin: 'I'm Sorry' appeared first on WIRED.

7 Password Experts on How to Lock Down Your Online Security

You've got the password basics down. It's time for some advanced techniques. The post 7 Password Experts on How to Lock Down Your Online Security appeared first on WIRED.

Android Malware Clicker.D!Gen Found on Google Play

Recently the Mobile Malware Research Team of Intel Security found on Google Play a new campaign of Android/Clicker.G in dozens of published malicious apps. This threat targets Russians but the apps are accessible worldwide. The attackers lure their victims with apps associated with health care, sports, food, games, and many other topics. Show More Summary

So … Now the Government Wants to Hack Cybercrime Victims

Changes to rules for issuing search warrants give law enforcement expansive authority to hack computers, critics say. We parse the details to help you understand what this means. The post So … Now the Government Wants to Hack Cybercrime Victims appeared first on WIRED.

ImageMagick vulnerability exposes countless websites to exploit

The image processing software gives attackers the chance to perform remote code execution through vulnerable domains.

Copyright © 2015 Regator, LLC