Category: Wired

Flaws in Ubiquitous ATM Software Could Have Let Attackers Take Over Cash Machines
09
Aug
2024

Flaws in Ubiquitous ATM Software Could Have Let Attackers Take Over Cash Machines

There is a grand tradition at the annual Defcon security conference in Las Vegas of hacking ATMs. Unlocking them with…

Computer Crash Reports Are an Untapped Hacker Gold Mine
09
Aug
2024

Computer Crash Reports Are an Untapped Hacker Gold Mine

When a bad software update from the security firm CrowdStrike inadvertently caused digital chaos around the world last month, the…

Tricky Web Timing Attacks Are Getting Easier to Use—and Abuse
09
Aug
2024

Tricky Web Timing Attacks Are Getting Easier to Use—and Abuse

Researchers have long known that they can glean hidden information about the inner workings of a website by measuring the…

Microsoft’s AI Can Be Turned Into an Automated Phishing Machine
08
Aug
2024

Microsoft’s AI Can Be Turned Into an Automated Phishing Machine

Among the other attacks created by Bargury is a demonstration of how a hacker—who, again, must already have hijacked an…

USPS Text Scammers Duped His Wife, So He Hacked Their Operation
08
Aug
2024

USPS Text Scammers Duped His Wife, So He Hacked Their Operation

Smith trawled Reddit and other online sources to find people reporting the scam and the URLs being used, which he…

Watch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokes
08
Aug
2024

Watch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokes

“I think I’ve created the first laser microphone that’s actually modulated in the radio frequency domain,” Kamkar says. “Once I…

Inside the Dark World of Doxing for Profit
08
Aug
2024

Inside the Dark World of Doxing for Profit

Since the early 1990s, people have used doxing as a toxic way to strike digital revenge—stripping away someone’s anonymity by…

A Flaw in Windows Update Opens the Door to Zombie Exploits
07
Aug
2024

A Flaw in Windows Update Opens the Door to Zombie Exploits

New research being presented at the Black Hat security conference in Las Vegas today shows that a vulnerability in Windows…

A New Plan to Break the Cycle of Destructive Critical Infrastructure Hacks
06
Aug
2024

A New Plan to Break the Cycle of Destructive Critical Infrastructure Hacks

“It’s not just that the water goes out, it’s that when the sole wastewater facility in your community is down…

How Project 2025 Would Put US Elections at Risk
05
Aug
2024

How Project 2025 Would Put US Elections at Risk

If anything, the military has impinged on CISA’s territory—not the other way around—out of exasperation with the civilian agency’s constrained…

US Hands Over Russian Cybercriminals in WSJ Reporter Prisoner Swap
03
Aug
2024

US Hands Over Russian Cybercriminals in WSJ Reporter Prisoner Swap

If it seems like there’s suddenly a whole lot more data breaches, you may be right. Part of this apparent…

Sensitive Illinois Voter Data Exposed by Contractor’s Unsecured Databases
02
Aug
2024

Sensitive Illinois Voter Data Exposed by Contractor’s Unsecured Databases

Databases containing sensitive voter information from multiple counties in Illinois were openly accessible on the internet, revealing 4.6 million records…