When security researchers in the past found ways to hijack vehicles' internet-connected systems, their proof-of-concept demonstrations tended to show, thankfully, that hacking cars is hard. Exploits like the ones that hackers used to remotely take over a Chevrolet Impala in 2010 or a Jeep in 2015 took years of work …
Read More »First Israel’s Exploding Pagers Maimed and Killed. Now Comes the Paranoia
When Nadim Kobeissi was a child growing up in Beirut in the early 2000s, sonic booms created by the Israel Defense Forces' planes in the skies above Lebanon would occasionally rattle his home, generating enough noise and concussive force that he and his family would sometimes sleep in the hallways …
Read More »Russia’s Most Notorious Special Forces Unit Now Has Its Own Cyber Warfare Team
Russia's military intelligence agency, the GRU, has long had a reputation as one of the world's most aggressive practitioners of sabotage, assassination, and cyber warfare, with hackers who take pride in working under the same banner as violent special forces operators. But one new group within that agency shows how …
Read More »Under Meredith Whittaker, Signal Is Out to Prove Surveillance Capitalism Wrong
ten years ago, WIRED published a news story about how two little-known, slightly ramshackle encryption apps called RedPhone and TextSecure were merging to form something called Signal. Since that July in 2014, Signal has transformed from a cypherpunk curiosity—created by an anarchist coder, run by a scrappy team working in …
Read More »Want to Win a Bike Race? Hack Your Rival’s Wireless Shifters
Professional cycling has, in its recent history, been prone to a shocking variety of cheating methods and dirty tricks. Performance-enhancing drugs. Tacks strewn on race courses. Even stealthy motors hidden inside of wheel hubs. Now, for those who fail to download a software patch for their gear shifters—yes, bike components …
Read More »A Single Iranian Hacker Group Targeted Both Presidential Campaigns, Google Says
When Donald Trump's presidential campaign publicly stated last week that it had been successfully targeted by Iranian hackers, the news may have initially seemed like a sign that the Middle Eastern country was particularly focused on the candidate whom it perceived to take the most hawkish approach to its regime. …
Read More »The Hacker Who Hunts Video Game Speedrunning Cheaters
Speedrunning video games, the competitive field of playing through digital games as quickly as possible, has in recent years been elevated into something between a virtuosic form of fingers-and-thumbs athletics and a highly technical science. The best speedruns reduce epic games meant to take dozens of hours to single-digit minutes …
Read More »‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections
Security flaws in your computer's firmware, the deep-seated code that loads first when you turn the machine on and controls even how its operating system boots up, have long been a target for hackers looking for a stealthy foothold. But only rarely does that kind of vulnerability appear not in …
Read More »How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards
HID Global's keycards—the company's radio-frequency-enabled plastic rectangles that are inside hundreds of millions of pockets and purses—serve as the front line of physical security for hundreds of companies and government agencies. They can also be spoofed, it turns out, by any hacker clever enough to read one of those cards …
Read More »Watch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokes
In a famous scene from the 1992 movie Sneakers, a hacker classic, the main characters park a surveillance van across the street from their target's office and point a telephoto lens through his window—only to find that their view of his computer keyboard is blocked by the surprise entrance of …
Read More »