'Remini' App Used by Schools Left Personal Info Open to the World

The API exposed the profile photos of children, as well as email addresses, phone numbers, and milestones parents and educators use the app to preserve.
Joseph Cox

The Pentagon's Weapons Are 'Easily Hacked' With 'Basic Tools'

A new government report reveals that it took hackers just one hour to gain access to a weapon system, and the Pentagon didn't change the default password on "multiple" systems.
Matthew Gault

The Cybersecurity World Is Debating WTF Is Going on With Bloomberg’s Chinese Microchip Stories

No one is really sure who to believe after Businessweek's bombshell story on an alleged Chinese supply chain attack against Apple, Amazon, and others.
Jason Koebler
Joseph Cox
Lorenzo Franceschi-Bicchierai

Researchers Figured Out How to Hack a Tesla’s Locks in Under Two Seconds

A team of researchers demonstrates how they hacked Tesla fobs.
Samantha Cole
Internet Insecurity

Hackers Stole Personal Data of 2 Million T-Mobile Customers

T-Mobile disclosed an “incident” in which hackers accessed "some" customers' personal information—but no financial data or passwords.
Lorenzo Franceschi-Bicchierai

An Incredibly Simple Hack Had the Potential to Manipulate Cryptocurrency Markets

Visitors to Ethereum blockchain explorer Etherscan.io on Monday were shown a pop-up that said, “l337,” but the hackers could have tricked site visitors by superficially changing values on the blockchain record.
Jordan Pearson

Canadian Banks Say ‘Fraudsters’ Stole Information From at Least 40,000 Customers

Attackers electronically accessed personal and account information from clients at Simplii Financial and the Bank of Montreal.
Jordan Pearson
make it stop

Hacked Retail Robots Can Assault Customers With Porn and Demand Bitcoin

IOActive researchers found that ransomware attackers could force SoftBank Robotics robots to demand money, display porn in public places and cuss out customers.
Mack DeGeurin
Hey Cortana

Researchers Bypassed Windows Password Locks With Cortana Voice Commands

Two independent Israeli researchers found a way for an attacker to bypass the lock protection on Windows machines and install malware by using voice commands directed at Cortana.
Kim Zetter

A Hacker Returned $17 Million In Stolen Ethereum

Why would a thief return their spoils?
Jordan Pearson
When Spies Come Home

Hacker Strikes ‘Stalkerware’ Companies, Stealing Alleged Texts and GPS Locations of Customers

Nearly a year after Motherboard reported the data breaches of two spyware companies, another hacker has independently targeted two more.
Joseph Cox
Another Day Another Hack

Harper’s Magazine Warns Subscribers That Passwords May Have Been Stolen

No one is immune to the ever-rolling wave of account data breaches.
Joseph Cox