Category: Wired

Want to Win a Bike Race? Hack Your Rival’s Wireless Shifters
14
Aug
2024

Want to Win a Bike Race? Hack Your Rival’s Wireless Shifters

Exactly how the patch will be deployed to customers isn’t quite clear either. The company writes that “riders can perform…

Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All
11
Aug
2024

Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All

If you know where to look, plenty of secrets can be found online. Since the fall of 2021, independent security…

The Hacker Who Hunts Video Game Speedrunning Cheaters
11
Aug
2024

The Hacker Who Hunts Video Game Speedrunning Cheaters

The night before Cecil’s Defcon talk, Maselewski wrote in a final email to WIRED that he believes those alleging that…

Apple Prototypes and Corporate Secrets Are for Sale Online—If You Know Where to Look
10
Aug
2024

Apple Prototypes and Corporate Secrets Are for Sale Online—If You Know Where to Look

It’s probably been a while since anyone thought about Apple’s router and network storage combo called Time Capsule. Released in…

Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs
10
Aug
2024

Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs

Demand for graphics processing units or GPUs has exploded in recent years as video rendering and artificial intelligence systems have…

How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards
10
Aug
2024

How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards

Finally, HID says that “to its knowledge,” none of its encoder keys have leaked or been distributed publicly, and “none…

‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections
09
Aug
2024

‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections

In a background statement to WIRED, AMD emphasized the difficulty of exploiting Sinkclose: To take advantage of the vulnerability, a…

Flaws in Ubiquitous ATM Software Could Have Let Attackers Take Over Cash Machines
09
Aug
2024

Flaws in Ubiquitous ATM Software Could Have Let Attackers Take Over Cash Machines

There is a grand tradition at the annual Defcon security conference in Las Vegas of hacking ATMs. Unlocking them with…

Computer Crash Reports Are an Untapped Hacker Gold Mine
09
Aug
2024

Computer Crash Reports Are an Untapped Hacker Gold Mine

When a bad software update from the security firm CrowdStrike inadvertently caused digital chaos around the world last month, the…

Tricky Web Timing Attacks Are Getting Easier to Use—and Abuse
09
Aug
2024

Tricky Web Timing Attacks Are Getting Easier to Use—and Abuse

Researchers have long known that they can glean hidden information about the inner workings of a website by measuring the…

Microsoft’s AI Can Be Turned Into an Automated Phishing Machine
08
Aug
2024

Microsoft’s AI Can Be Turned Into an Automated Phishing Machine

Among the other attacks created by Bargury is a demonstration of how a hacker—who, again, must already have hijacked an…

USPS Text Scammers Duped His Wife, So He Hacked Their Operation
08
Aug
2024

USPS Text Scammers Duped His Wife, So He Hacked Their Operation

Smith trawled Reddit and other online sources to find people reporting the scam and the URLs being used, which he…