The hackers behind TrickBot have begun probing victim PCs for vulnerable firmware, which would let them…
Author: Andy Greenberg
What Is the Signal Encryption Protocol?
As the Signal protocol becomes the industry standard, it's worth understanding what sets it apart from…
This Bluetooth Attack Can Steal a Tesla Model X in Minutes
The company is rolling out a patch for the vulnerabilities, which allowed one researcher to break…
Forget Impostors. Among Us Is a Playground for Hackers
The blockbuster game of deception has security holes that let cheaters run wild.
The iOS Covid App Ecosystem Has Become a Privacy Minefield
An analysis of nearly 500 Covid-related apps worldwide shows major differences in how much data they…
Feds Seize $1 Billion in Stolen Silk Road Bitcoins
A hacker identified only as Individual X had been sitting on a cryptocurrency gold mine for…
The FBI Says ‘Boogaloo Boys’ Bought 3D-Printed Gun Parts
A criminal complaint alleges that a West Virginia man disguised the plastic components as wall hangers…
The Russian Hackers Playing ‘Chekhov’s Gun’ With US Targets
Berserk Bear has had plenty of opportunity to cause serious trouble. So why hasn't it yet?
The US Sanctions Russians for Potentially ‘Fatal’ Malware
The message is meant to deter any similar attack against US infrastructure.
How 30 Lines of Code Blew Up a 27-Ton Generator
A secret experiment in 2007 proved that hackers could devastate power grid equipment beyond repair—with a…