All Blogs / Technology / Security / Popular


Cisco fixes hard-coded password 'backdoor' flaw in Wi-Fi access points

Two of the vulnerabilities were considered 'critical," allowing an attacker to take complete over an affected device.

The Oscar Nominations Go to Big-Budget, Big-Spectacle Films

From "The Revenant" to "The Martian" to "Straight Outta Compton," the nominees were ruled by big-studio, big-audience favorites. The post The Oscar Nominations Go to Big-Budget, Big-Spectacle Films appeared first on WIRED.

The Silk Road’s Dark-Web Dream Is Dead

The Silk Road's libertarian free-trade zone has devolved into a fragmented, less ethical, and far less trusted collection of scam-ridden black markets. The post The Silk Road’s Dark-Web Dream Is Dead appeared first on WIRED.

Typosquatting Attacks Alive and Well–Unfortunately

Typosquatting doesn’t get the attention that it used to, but it remains an effective means for attackers to capitalize on unsuspecting users. Of course, the most effective instances are those that target high-traffic sites. I stumbled...Show More Summary

US intelligence chief's personal email, phone hacked

The same group previously, and successfully, targeted the CIA director.

Kaspersky Lab discovers Silverlight zero-day vulnerability

The dangerous flaw existed in technology used to display multimedia online and allowed the complete takeover of vulnerable systems.

Hacking Team’s Leak Helped Researchers Hunt Down a Zero-Day

Researchers at Kaspersky Lab have, for the first time, discovered a valuable zero-day exploit after intentionally going on the hunt for it. The post Hacking Team’s Leak Helped Researchers Hunt Down a Zero-Day appeared first on WIRED...

Teen hacker compromises CIA spy chief accounts

A teenage hacker has claimed responsibility for breaking into James Clapper's phone, email and his wife's accounts.

Suspected members of Bitcoin extortion group DD4BC arrested

Two suspected members of the DDoS group have been arrested and detained.

Hacking for Charity: Automated Bug-finding in LibOTR

At the end of last year, we had some free time to explore new and interesting uses of the automated bug-finding technology we developed for the DARPA Cyber Grand Challenge. While the rest of the competitors are quietly preparing for the CGC Final Event, we can entertain you with tales of running our bug-finding tools […]

Ross Ulbricht’s Defense Focuses on Corrupt Feds In Silk Road Appeal

Ulbricht's defense attacks the court's rulings on everything from evidence to sentencing, but focuses on two corrupt agents who investigated the Silk Road. The post Ross Ulbricht’s Defense Focuses on Corrupt Feds In Silk Road Appeal appeared first on WIRED.

Security Predictions for 2016: January #SecChat

The New Year is finally here, bringing with it a bevy of new (and some not-so-new) cybersecurity threats. Ransomware authors are enjoying commercial success with new “as-a-service” models, while fileless malware has become stealthier to the point of near invisibility. Show More Summary

Microsoft retires older Internet Explorer versions, leaving millions unpatched

The software giant will in most cases no longer support the aging browser, despite the fact millions are still running it.

Microsoft patches six critical security flaws affecting Windows, Office

The software giant also retires older versions of its Internet Explorer browser.

An Easy Way for Hackers to Remotely Burn Industrial Motors

Devices that control the speed of industrial motors operating water plant pumps and other equipment can be remotely hacked and destroyed. The post An Easy Way for Hackers to Remotely Burn Industrial Motors appeared first on WIRED.

Simple eBay security flaw exposed millions of users to spear phishing campaigns

An XSS vulnerability in the auction site was only patched after the threat of public exposure.

Why Hotspot Shield's co-founder puts privacy over profits

One tech executive says it was by design that only a fraction of his customers pays for his service.

Hotspot Shield co-founder explains why he doesn't want your data

Some companies collect every scrap of data they can, but others' think knowing nothing is better.

General Motors bug bounty program: Be careful, or court

Will GM's bug bounty program prove to be a success without a financial incentive -- and the stringent demands placed to stop researchers being sued?

Copyright © 2015 Regator, LLC