A team of researchers have developed a method for extracting authentication keys out of HID encoders,…
Author: Andy Greenberg
Watch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokes
Hacker Samy Kamkar is debuting his own open source version of a laser microphone—a spy tool…
A $500 Open-Source Tool Lets Anyone Hack Computer Chips With Lasers
The RayV Lite will make it hundreds of times cheaper for anyone to carry out physics-bending…
How Russia-Linked Malware Cut Heat to 600 Ukrainian Buildings in Deep Winter
The code, the first of its kind, was used to sabotage a heating utility in Lviv…
Pressure Grows in Congress to Treat Crypto Investigator Tigran Gambaryan, Jailed in Nigeria, as a Hostage
A new resolution echoes what 16 members of Congress have already said to the White House:…
Medical-Targeted Ransomware Is Breaking Records After Change Healthcare’s $22M Payout
Cybersecurity firm Recorded Future counted 44 health-care-related incidents in the month after Change Healthcare’s payment came…
Microsoft Will Switch Off Recall by Default After Security Backlash
After weeks of withering criticism and exposed security flaws, Microsoft has vastly scaled back its ambitions…
Microsoft’s Recall Feature Is Even More Hackable Than You Thought
A new discovery that the AI-enabled feature’s historical data can be accessed even by hackers without…
He Trained Cops to Fight Crypto Crime—and Allegedly Ran a $100M Dark-Web Drug Market
The strange journey of Lin Rui-siang, the 23-year-old accused of running the Incognito black market, extorting…
Teslas Can Still Be Stolen With a Cheap Radio Hack—Despite New Keyless Tech
Ultra-wideband radio has been heralded as the solution for “relay attacks” that are used to steal…