At the start of September, Nour was having an ordinary evening at home in Beirut—eating pumpkin seeds and watching Netflix—when the SMS hit her device like the smartphone version of a brick through her window. The sender name appeared as eight question marks, “????? ???”, and in the message preview …
Read More »Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug
When security researchers in the past found ways to hijack vehicles' internet-connected systems, their proof-of-concept demonstrations tended to show, thankfully, that hacking cars is hard. Exploits like the ones that hackers used to remotely take over a Chevrolet Impala in 2010 or a Jeep in 2015 took years of work …
Read More »Did a Chinese University Hacking Competition Target a Real Victim?
Capture the flag hacking contests at security conferences generally serve two purposes: to help participants develop and demonstrate computer hacking and security skills, and to assist employers and government agencies with discovering and recruiting new talent. But one security conference in China may have taken its contest a step further—potentially …
Read More »Hackers Threaten to Leak Planned Parenthood Data
Your devices may be revealing a lot more about your life than you realize. During the Democratic National Convention in Chicago last month, we set out to find just how much data is floating around in the digital ether all around us. Armed with a fanny pack filled with radios—including …
Read More »YubiKeys Are a Security Gold Standard—but They Can Be Cloned
The YubiKey 5, the most widely used hardware token for two-factor authentication based on the FIDO standard, contains a cryptographic flaw that makes the finger-sized device vulnerable to cloning when an attacker gains temporary physical access to it, researchers said Tuesday. The cryptographic flaw, known as a side channel, resides …
Read More »Russia’s Most Notorious Special Forces Unit Now Has Its Own Cyber Warfare Team
Russia's military intelligence agency, the GRU, has long had a reputation as one of the world's most aggressive practitioners of sabotage, assassination, and cyber warfare, with hackers who take pride in working under the same banner as violent special forces operators. But one new group within that agency shows how …
Read More »How the Cyber-Thriller ‘Red Rooms’ Became a Cult Classic Before It Was Ever Released
No matter how hard movies like Hackers, Blackhat, and Unfriended may work to convince you otherwise, there’s nothing especially cinematic about using the internet. As immersive and time-consuming as “being online” can be, when you zoom out, it’s mostly just people with bad posture hunched over computer terminals, clicking and …
Read More »Taylor Swift Concert Terror Plot Was Thwarted by Key CIA Tip
Pavel Durov, the founder and CEO of the communication app Telegram, was arrested in France on Saturday as part of an investigation into his and Telegram’s alleged failure to moderate illegal content on the platform, among other allegations. After being detained for four days, he was charged on Wednesday evening, …
Read More »Powerful Spyware Exploits Enable a New String of ‘Watering Hole’ Attacks
In recent years, elite commercial spyware vendors like Intellexa and NSO Group have developed an array of powerful hacking tools that exploit rare and unpatched “zero-day” software vulnerabilities to compromise victim devices. And increasingly, governments around the world have emerged as the prime customers for these tools, compromising the smartphones …
Read More »Notorious Iranian Hackers Have Been Targeting the Space Industry With a New Backdoor
The Iranian government-backed hacking group known as APT 33 has been active for more than 10 years, conducting aggressive espionage operations against a diverse array of public and private sector victims around the world, including critical infrastructure targets. And while the group is particularly known for strategic but technically simple …
Read More »