Since war first broke out between Ukraine and Russia in 2014, Russian hackers have used some of the most sophisticated hacking techniques ever seen in the wild to destroy Ukrainian networks, disrupt the country’s satellite communications, and even trigger blackouts for hundreds of thousands of Ukrainian citizens. But the mysterious …
Read More »The Low-Stakes Race to Crack an Encrypted German U-Boat Message
On a balmy Saturday in July, at approximately 15:30 hours, the first signals come in over the radio receiver. Its faint dip dip dip is barely detectable as a small team of engineers and scientists scramble to their stations and listen, trying to decipher the message, delivered through Morse code. …
Read More »This Tool Lets Hackers Dox Almost Anyone in the US
On Wednesday, August 23, Yevgeny Prigozhin, the head of the Russian mercenary outfit Wagner Group, was killed after his plane exploded and fell from the sky. While the details of exactly what happened are still scarce, open source information has helped to fill in the gaps. To investigate technology, you …
Read More »Why The Chainsmokers Invest in—and Party With—Niche Cybersecurity Companies
On Saturday, with Hurricane Hilary looming, Alex Pall and Drew Taggart of the DJ duo The Chainsmokers performed a concert at Los Angeles State Historic Park that set an all-time attendance record for the venue. By Tuesday night, Pall was in Switzerland, speaking to WIRED on Zoom, but he had …
Read More »A New Supply Chain Attack Hit Close to 100 Victims—and Clues Point to China
Every software supply chain attack, in which hackers corrupt a legitimate application to push out their malware to hundreds or potentially thousands of victims, represents a disturbing new outbreak of a cybersecurity scourge. But when that supply chain attack is pulled off by a mysterious group of hackers, abusing a …
Read More »A Huge Scam Targeting Kids With Roblox and Fortnite 'Offers' Has Been Hiding in Plain Sight
Thousands of websites belonging to US government agencies, leading universities, and professional organizations have been hijacked over the last half decade and used to push scammy offers and promotions, new research has found. Many of these scams are aimed at children and attempt to trick them into downloading apps, malware, …
Read More »GitHub’s Hardcore Plan to Roll Out Mandatory Two-Factor
You’ve heard the advice for years: Turn on two-factor authentication everywhere it’s offered. It’s long been clear that using only a username and password to secure digital accounts isn’t enough. But layering on an additional authentication “factor”—like a randomly generated code or a physical token—makes the keys to your kingdom …
Read More »