This Notorious Botnet Has an Alarming New Trick

The hackers behind TrickBot have begun probing victim PCs for vulnerable firmware, which would let them…

What Is the Signal Encryption Protocol?

As the Signal protocol becomes the industry standard, it's worth understanding what sets it apart from…

This Bluetooth Attack Can Steal a Tesla Model X in Minutes

The company is rolling out a patch for the vulnerabilities, which allowed one researcher to break…

Forget Impostors. Among Us Is a Playground for Hackers

The blockbuster game of deception has security holes that let cheaters run wild.

The iOS Covid App Ecosystem Has Become a Privacy Minefield

An analysis of nearly 500 Covid-related apps worldwide shows major differences in how much data they…

Feds Seize $1 Billion in Stolen Silk Road Bitcoins

A hacker identified only as Individual X had been sitting on a cryptocurrency gold mine for…

The FBI Says ‘Boogaloo Boys’ Bought 3D-Printed Gun Parts

A criminal complaint alleges that a West Virginia man disguised the plastic components as wall hangers…

The Russian Hackers Playing ‘Chekhov’s Gun’ With US Targets

Berserk Bear has had plenty of opportunity to cause serious trouble. So why hasn't it yet?

The US Sanctions Russians for Potentially ‘Fatal’ Malware

The message is meant to deter any similar attack against US infrastructure.

How 30 Lines of Code Blew Up a 27-Ton Generator

A secret experiment in 2007 proved that hackers could devastate power grid equipment beyond repair—with a…