From Equifax to Crash Override, it was a banner year for cybersecurity fails.
from
https://www.wired.com/story/worst-hacks-2017
Sunday, December 31, 2017
Saturday, December 30, 2017
Trolls, Bots, and Fake News Made 2017 a Terrible Year for Internet Freedom
Trolls, bots, and fake news posed a serious threat to internet freedom this year—and there's no easy answer in sight.
from
https://www.wired.com/story/internet-freedom-2017
from
https://www.wired.com/story/internet-freedom-2017
Friday, December 29, 2017
The Most-read WIRED Security Stories of 2017
Numerous tales of hacking and breaches proves just how permeable the digital membrane can be.
from
https://www.wired.com/story/most-read-wired-security-stories-2017
from
https://www.wired.com/story/most-read-wired-security-stories-2017
Cryptojacking Has Gotten Out of Control
The practice of using a website visitor's device to mine cryptocurrency has expanded—and evolved—at an alarming rate.
from
https://www.wired.com/story/cryptojacking-has-gotten-out-of-control
from
https://www.wired.com/story/cryptojacking-has-gotten-out-of-control
Thursday, December 28, 2017
The Most Dangerous People on the Internet in 2017: Donald Trump, Russian Hackers, and More
From Donald Trump to Russian hackers, these are the dangerous characters we’ve been watching online in 2017.
from
https://www.wired.com/story/most-dangerous-people-internet-2017
from
https://www.wired.com/story/most-dangerous-people-internet-2017
Wednesday, December 27, 2017
Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet
Researchers found that network configuration errors have left thousands of high-end speakers open to epic audio pranking.
from
https://www.wired.com/story/hackers-can-rickroll-sonos-bose-speakers-over-internet
from
https://www.wired.com/story/hackers-can-rickroll-sonos-bose-speakers-over-internet
Saturday, December 23, 2017
France Goes After WhatsApp For Sharing Data With Facebook, and More Security News This Week
A fake *Cuphead*, a WhatsApp privacy blow-up, and more of the week's top security news.
from
https://www.wired.com/story/france-goes-after-whatsapp-for-sharing-data-with-facebook
from
https://www.wired.com/story/france-goes-after-whatsapp-for-sharing-data-with-facebook
The Section 702 Debate Has Taken Place in the Dark
As the debate over Section 702 continues, those deciding its fate don't know basic facts about how it works.
from
https://www.wired.com/story/section-702-warrantless-surveillance-debate
from
https://www.wired.com/story/section-702-warrantless-surveillance-debate
Friday, December 22, 2017
Snowden-Backed App 'Haven' Turns Your Phone Into a Home Security System
The NSA leaker's latest project aims to secure your computer—and you—from not just digital but physical attacks.
from
https://www.wired.com/story/snowden-haven-app-turns-phone-into-home-security-system
from
https://www.wired.com/story/snowden-haven-app-turns-phone-into-home-security-system
Thursday, December 21, 2017
Tech Alone Can't Solve the Opioid Crisis
A Health and Human Services hackathon produced smart ideas for the fight against opioid addiction—but can only do so much in the face of a collapsing health care system.
from
https://www.wired.com/story/opioid-crisis-hackathon-tech-health-care-funding
from
https://www.wired.com/story/opioid-crisis-hackathon-tech-health-care-funding
Wednesday, December 20, 2017
Don't Get Your Kid an Internet-Connected Toy
They can be hacked. They're a privacy nightmare. This year, it's not too late to keep the IoT toys away from the tree.
from
https://www.wired.com/story/dont-gift-internet-connected-toys
from
https://www.wired.com/story/dont-gift-internet-connected-toys
Researchers Made Google's Image Recognition AI Mistake a Rifle For a Helicopter
To safeguard AI, we’re going to need to solve the problem of ‘adversarial examples.’
from
https://www.wired.com/story/researcher-fooled-a-google-ai-into-thinking-a-rifle-was-a-helicopter
from
https://www.wired.com/story/researcher-fooled-a-google-ai-into-thinking-a-rifle-was-a-helicopter
Tuesday, December 19, 2017
Hold North Korea Accountable for WannaCry—and the NSA, Too
As the US government points the finger at North Korea for the WannaCry ransomware epidemic, it also needs to acknowledge the role of its leaked hacking tools.
from
https://www.wired.com/story/korea-accountable-wannacry-nsa-eternal-blue
from
https://www.wired.com/story/korea-accountable-wannacry-nsa-eternal-blue
Why the International Space Station Is the Single Best Thing Humanity Did
By the time the ISS makes its fiery return to Earth, it will have become a stepping stone to lunar colonies and the first human mission to Mars.
from
https://www.wired.com/story/why-the-international-space-station-is-the-single-best-thing-we-did
from
https://www.wired.com/story/why-the-international-space-station-is-the-single-best-thing-we-did
In _Star Wars: The Last Jedi_, the Resistance Keeps Making the Same Tactical Mistake
The urge to fight one decisive battle has undone countless real-world rebellions—and those in the Star Wars universe as well.
from
https://www.wired.com/story/star-wars-last-jedi-the-resistance-tactical-mistake
from
https://www.wired.com/story/star-wars-last-jedi-the-resistance-tactical-mistake
Saturday, December 16, 2017
Facebook Squashes 19-Year-Old Bug, and More Security News This Week
A Facebook bug, the Kaspersky ban becomes law, and more of the week's top security news.
from
https://www.wired.com/story/facebook-squashes-19-year-old-bug-security-news-this-week
from
https://www.wired.com/story/facebook-squashes-19-year-old-bug-security-news-this-week
Friday, December 15, 2017
MobileCoin: A New Cryptocurrency From Signal Creator Moxie Marlinspike
MobileCoin aims to make cryptocurrency transactions quick and easy for everyone, while still preserving privacy and decentralization.
from
https://www.wired.com/story/mobilecoin-cryptocurrency
from
https://www.wired.com/story/mobilecoin-cryptocurrency
Thursday, December 14, 2017
Triton Malware Targets Industrial Safety Systems In the Middle East
A rare and dangerous new form of malware targets the industrial safety control systems that protect human life.
from
https://www.wired.com/story/triton-malware-targets-industrial-safety-systems-in-the-middle-east
from
https://www.wired.com/story/triton-malware-targets-industrial-safety-systems-in-the-middle-east
Wednesday, December 13, 2017
The Mirai Botnet Was Part of a College Student Minecraft Scheme
The DDoS attack that crippled the internet last fall wasn't the work of a nation-state. It was three college kids working a *Minecraft* hustle.
from
https://www.wired.com/story/mirai-botnet-minecraft-scam-brought-down-the-internet
from
https://www.wired.com/story/mirai-botnet-minecraft-scam-brought-down-the-internet
Bots and Form Letters Make It Nearly Impossible to Find Real FCC Net Neutrality Comments
Over seven months, 39 Nicholas Thompsons submitted net neutrality comments to the FCC. We tried to track each of them down.
from
https://www.wired.com/story/bots-form-letters-humans-fcc-net-neutrality-comments
from
https://www.wired.com/story/bots-form-letters-humans-fcc-net-neutrality-comments
Apple Security Flaws Give Some Researchers Concern About Deeper Issues
Apple's had a rough stretch for security. But is it just a rough patch, or something deeper?
from
https://www.wired.com/story/apples-security-macos-high-sierra-ios-11
from
https://www.wired.com/story/apples-security-macos-high-sierra-ios-11
Tuesday, December 12, 2017
Exclusive: Tracing ISIS’ Weapons Supply Chain—Back to the US
The Islamic State is designing and mass-producing its own advanced munitions—with parts from all over the world.
from
https://www.wired.com/story/terror-industrial-complex-isis-munitions-supply-chain
from
https://www.wired.com/story/terror-industrial-complex-isis-munitions-supply-chain
Sunday, December 10, 2017
Security News This Week: Apple Patches a Very Bad iOS HomeKit Bug
Another Apple security goof, email hacks, and more of the week's top security news.
from
https://www.wired.com/story/security-news-this-week-apple-patches-a-very-bad-ios-homekit-bug
from
https://www.wired.com/story/security-news-this-week-apple-patches-a-very-bad-ios-homekit-bug
Saturday, December 9, 2017
Take These 7 Steps Now to Reach Password Perfection
Admit it: Your passwords aren't great. But if you fix them up, you'll have a solid first-line digital defense.
from
https://www.wired.com/story/7-steps-to-password-perfection
from
https://www.wired.com/story/7-steps-to-password-perfection
Physical Measures to Amp Up Your Digital Security
Not every digital problem requires a software solution. For an added layer of safety, look to these real-world reinforcements.
from
https://www.wired.com/story/physical-security-measures
from
https://www.wired.com/story/physical-security-measures
The A-B-C’s of Keeping Your Kids Safe Online
You can't lock your offspring out of the internet forever. But you can prepare them to navigate it properly.
from
https://www.wired.com/story/abcs-of-keeping-kids-safe-online
from
https://www.wired.com/story/abcs-of-keeping-kids-safe-online
How to Encrypt All of the Things, From Chats to Calls and More
Want to keep outsiders from listening in on your chats, phone calls, and more? Encrypt them. All of them.
from
https://www.wired.com/story/encrypt-all-of-the-things
from
https://www.wired.com/story/encrypt-all-of-the-things
Extreme Security Measures for the Extra Paranoid
Someone with serious tools is trying to pry open your digital secrets. Don't let them.
from
https://www.wired.com/story/extreme-security-measures
from
https://www.wired.com/story/extreme-security-measures
How to Rip the Mics Out of Your MacBook and iPhone
One way to make sure no one's listening in on your private conversations? Drop the mics. Literally.
from
https://www.wired.com/story/remove-the-mic-from-your-phone
from
https://www.wired.com/story/remove-the-mic-from-your-phone
Resist Phishing Attacks with Three Golden Rules
They're preying on your emotions. Don't get stuck on their digital hooks.
from
https://www.wired.com/story/resist-phishing-attacks
from
https://www.wired.com/story/resist-phishing-attacks
The Wired Guide to Digital Security, From Passwords to Faraday Cages
In an age of nonstop breaches and hacks, here are ways to improve your online security based on your level of risk, from average user to NSA contractor.
from
https://www.wired.com/2017/12/digital-security-guide
from
https://www.wired.com/2017/12/digital-security-guide
Google Advanced Protection: The Most Secure Account of All
Google Advanced Protection offers a level of security that's hard to match. Just expect some serious convenience trade-offs along the way.
from
https://www.wired.com/story/google-advanced-protection
from
https://www.wired.com/story/google-advanced-protection
What To Do If You've Been Doxed
If a troll is spilling your personal info across the internet, you have ways to fight back. Eva Galperin, director of cybersecurity at the EFF, shares tips.
from
https://www.wired.com/story/what-do-to-if-you-are-being-doxed
from
https://www.wired.com/story/what-do-to-if-you-are-being-doxed
The Grand Tor: How to Go Anonymous Online
You may already be familiar with TorBrowser. But the anonymous internet has a lot more to offer.
from
https://www.wired.com/story/the-grand-tor
from
https://www.wired.com/story/the-grand-tor
How to Sweep For Bugs and Hidden Cameras
To keep them from listening in, take a very good look around you. And then bust out the tools.
from
https://www.wired.com/story/how-to-sweep-for-bugs
from
https://www.wired.com/story/how-to-sweep-for-bugs
Smartphone Security 101: Key Steps From PINs to Permissions
Keep your device safe from snoops with basic precautions like setting the right PIN and vetting your app permissions.
from
https://www.wired.com/story/smartphone-security-101
from
https://www.wired.com/story/smartphone-security-101
Friday, December 8, 2017
Megabreaches Happen. Here's How to Protect Yourself When They Do
The next megabreach is coming. Here's how you can cope if and when your info gets swept up.
from
https://www.wired.com/story/how-to-protect-yourself-after-the-next-big-corporate-hack
from
https://www.wired.com/story/how-to-protect-yourself-after-the-next-big-corporate-hack
Thursday, December 7, 2017
APT 34 Is an Iran-Linked Hacking Group That Probes Critical Infrastructure
A new Iran-linked hacking group called APT 34 has been spotted lurking in the networks of financial, energy, telecom, and chemical companies.
from
https://www.wired.com/story/apt-34-iranian-hackers-critical-infrastructure-companies
from
https://www.wired.com/story/apt-34-iranian-hackers-critical-infrastructure-companies
Microsoft's Project Sopris Could Secure the Next Generation of IoT
With Project Sopris, Microsoft has a new hardware solution for the next wave of IoT security problems.
from
https://www.wired.com/story/project-sopris-iot-security
from
https://www.wired.com/story/project-sopris-iot-security
Quantum Computing Is the Next Big Security Risk
Opinion: Rep. Will Hurd of Texas argues that quantum computers will rock current security protocols that protect government and financial systems.
from
https://www.wired.com/story/quantum-computing-is-the-next-big-security-risk
from
https://www.wired.com/story/quantum-computing-is-the-next-big-security-risk
Tuesday, December 5, 2017
Ethiopian Espionage Shows Commercial Spyware Is Out of Control
Opinion: A new report from Citizen Lab shows that governments are using commercial spyware to surveil dissidents and journalists.
from
https://www.wired.com/story/evidence-that-ethiopia-is-spying-on-journalists-shows-commercial-spyware-is-out-of-control
from
https://www.wired.com/story/evidence-that-ethiopia-is-spying-on-journalists-shows-commercial-spyware-is-out-of-control
Phishing Schemes Are Using HTTPS Encrypted Sites to Seem Legit
A green padlock might make it seem like a site is secure, but increasingly phishers are using it to lure victims into giving up sensitive info.
from
https://www.wired.com/story/phishing-schemes-use-encrypted-sites-to-seem-legit
from
https://www.wired.com/story/phishing-schemes-use-encrypted-sites-to-seem-legit
‘Mailsploit’ Lets Hackers Forge Perfect Email Spoofs
The attack uncovers bugs in how more than a dozen programs implement email's creaky protocol.
from
https://www.wired.com/story/mailsploit-lets-hackers-forge-perfect-email-spoofs
from
https://www.wired.com/story/mailsploit-lets-hackers-forge-perfect-email-spoofs
Ghostery 8 Deploys Artificial Intelligence in the Fight Against Ad Trackers
With the release of Ghostery 8, the popular ad-blocker introduces artificial intelligence and Smart Mode, a whole new level of usability for beginners.
from
https://www.wired.com/story/ghostery-deploys-ai-in-fight-against-ad-trackers
from
https://www.wired.com/story/ghostery-deploys-ai-in-fight-against-ad-trackers
Monday, December 4, 2017
The Evolution of Data Leaks
Equifax aside, companies are doing better at securing their info. But the phishers keep coming.
from
https://www.wired.com/story/evolution-of-data-leaks
from
https://www.wired.com/story/evolution-of-data-leaks
Saturday, December 2, 2017
A New Bill Wants Jail Time for Execs Who Hide Data Breaches
A bill to punish hack hiders, Apple bug fix bumbling, and more of the week's top security stories.
from
https://www.wired.com/story/a-new-bill-wants-jail-time-for-execs-who-hide-data-breaches
from
https://www.wired.com/story/a-new-bill-wants-jail-time-for-execs-who-hide-data-breaches
Trump and the Risks of Digital Hate
Trump's retweets of a British anti-Muslim hate group sound alarms for those who study the propaganda behind some of history's greatest tragedies.
from
https://www.wired.com/story/historians-see-terrifying-echoes-in-trumps-anti-muslim-tweets
from
https://www.wired.com/story/historians-see-terrifying-echoes-in-trumps-anti-muslim-tweets
Friday, December 1, 2017
Here's the NSA Agent Who Inexplicably Exposed Critical Secrets
The Justice Department has struck a plea deal with Nghia Hoang Pho, a programmer in the NSA's elite operations unit, for taking his highly classified work home with him.
from
https://www.wired.com/story/nsa-agent-exposed-critical-secrets
from
https://www.wired.com/story/nsa-agent-exposed-critical-secrets
Apple's MacOS High Sierra Bug Fix Reintroduces "Root" Problem For Some Users
The company's fix for an embarrassing security bug includes a big bug of its own.
from
https://www.wired.com/story/macos-update-undoes-apple-root-bug-patch
from
https://www.wired.com/story/macos-update-undoes-apple-root-bug-patch
North Korea's Latest Missile Test Was Even Scarier Than It Seemed
Further analysis of North Korea's latest ICBM launch shows that the country can likely land a nuclear weapon anywhere in the continental United States.
from
https://www.wired.com/story/north-korea-missile-test-scarier-than-it-seemed
from
https://www.wired.com/story/north-korea-missile-test-scarier-than-it-seemed
The Michael Flynn Indictment Is Robert Mueller's Most Significant Move yet
With the indictment of President Trump's former national security advisor Michael Flynn, special counsel Robert Mueller makes his most significant move yet.
from
https://www.wired.com/story/michael-flynns-guilty-plea-shows-that-robert-mueller-is-closing-in
from
https://www.wired.com/story/michael-flynns-guilty-plea-shows-that-robert-mueller-is-closing-in
The US Should Modernize Election Systems to Prevent Hacking
Opinion: Two senators from opposing parties argue that voting machines should be considered critical infrastructure, and funded accordingly.
from
https://www.wired.com/story/our-democracy-depends-on-secure-elections
from
https://www.wired.com/story/our-democracy-depends-on-secure-elections
Subscribe to:
Posts (Atom)