Quantcast

hacking

cryptojacking
cryptojacking

Hackers Infiltrated Tesla to Mine Cryptocurrency

The latest cryptojacking scheme targeted the car manufacturer.
Mack DeGuerin
a day ago
Gaming
Gaming

This Game Teaches the History of Cryptography

Make sure you’ve got paper and the internet handy.
Matthew Gault
2 days ago
Internet Insecurity
Internet Insecurity

Flight Simulator Add-On Tried to Catch Pirates By Installing Password-Stealing Malware on Their Computers

Malware included in the installer for pirated versions of the game steals usernames and passwords from Chrome: 'This is by far one of the most extreme, and bizarre, methods of DRM we've ever seen.'
Joseph Cox
3 days ago
Stalkerware
Stalkerware

A Hacker Has Wiped a Spyware Company’s Servers—Again

"I don't want to live in a world where younger generations grow up without privacy."
Lorenzo Franceschi-Bicchierai
2.16.18
wasted
wasted

A New Internet of Things Botnet Originated on 'Grand Theft Auto' Servers

Attackers said “God’s wrath will be employed against the IP that you provide us.”
Mack DeGeurin
2.15.18
Opinion
Opinion

Dissidents Have Been Abandoned and Besieged Online

Neither governments nor the cybersecurity community have taken enough responsibility for protecting human rights activists from hacking and surveillance.
Collin Anderson
Claudio Guarnieri
2.13.18
Magneto
Magneto

New Hack Can Steal Data From Devices in Faraday Cages

Last year Wikileaks released documents detailing how attackers can compromise offline computers. This new study goes one step further, exposing the fallibility of Faraday cages
Mack DeGeurin
2.12.18
Pyeongchang Olympics
Pyeongchang Olympics

Researchers: We Found the Olympic-Disrupting Malware

They're calling the malware 'Olympic Destroyer' and say they have "moderate confidence" that it was used to disrupt the Opening Ceremony.
Joseph Cox
2.12.18
iPhone
iPhone

How a Low-Level Apple Employee Leaked Some of the iPhone's Most Sensitive Code

This is how a small group of friends lost control of the leaked iBoot source code. The story behind one of Apple's most embarrassing leaks.
Lorenzo Franceschi-Bicchierai
2.9.18
zero days
zero days

How a Tiny Startup Became the Most Important Hacking Shop You’ve Never Heard Of

Inside the secretive industry that helps government hackers get around encryption.
Joseph Cox
Lorenzo Franceschi-Bicchierai
2.7.18
Internet Insecurity
Internet Insecurity

T-Mobile Is Sending a Mass Text Warning of ‘Industry-Wide’ Phone Hijacking Scam

Cybercriminals are increasingly targeting people’s phone numbers, hijacking and then using them to access people’s bank or social media accounts.
Lorenzo Franceschi-Bicchierai
2.5.18
point and click
point and click

New Tool Automatically Finds and Hacks Vulnerable Internet-Connected Devices

Hacking just got fully automated for script kiddies.
Joseph Cox
1.31.18