Security / Security News
-
Apple Prototypes and Corporate Secrets Are for Sale Online—If You Know Where to Look
It’s probably been a while since anyone thought about Apple’s router and network storage combo called Time Capsule. Released in…
Read More » -
Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs
Demand for graphics processing units or GPUs has exploded in recent years as video rendering and artificial intelligence systems have…
Read More » -
ATM Software Flaws Left Piles of Cash for Anyone Who Knew to Look
There is a grand tradition at the annual Defcon security conference in Las Vegas of hacking ATMs. Unlocking them with…
Read More » -
‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections
Security flaws in your computer’s firmware, the deep-seated code that loads first when you turn the machine on and controls…
Read More » -
How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards
HID Global’s keycards—the company’s radio-frequency-enabled plastic rectangles that are inside hundreds of millions of pockets and purses—serve as the front…
Read More » -
Computer Crash Reports Are an Untapped Hacker Gold Mine
When a bad software update from the security firm CrowdStrike inadvertently caused digital chaos around the world last month, the…
Read More » -
Tricky Web Timing Attacks Are Getting Easier to Use—and Abuse
Researchers have long known that they can glean hidden information about the inner workings of a website by measuring the…
Read More » -
Microsoft’s AI Can Be Turned Into an Automated Phishing Machine
Microsoft raced to put generative AI at the heart of its systems. Ask a question about an upcoming meeting and…
Read More » -
USPS Text Scammers Duped His Wife, So He Hacked Their Operation
Smith trawled Reddit and other online sources to find people reporting the scam and the URLs being used, which he…
Read More » -
Inside the Dark World of Doxing for Profit
Since the early 1990s, people have used doxing as a toxic way to strike digital revenge—stripping away someone’s anonymity by…
Read More »