Even after the DIY gunsmith's arrest on ****** assault charges, the fight for and against 3-D…
Author: Andy Greenberg
Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob
Weak encryption in the cars' key fobs allows all-too-easy theft, but you can set a PIN…
The Untold Story of NotPetya, the Most Devastating Cyberattack in History
Crippled ports. Paralyzed corporations. Frozen government agencies. How a single piece of code crashed the world.
Hacked Water Heaters Could Trigger Mass Blackouts Someday
A new study found that just 42,000 of those hacked home devices could be enough to…
Hackers Turned an Amazon Echo Into a Spy Bug
Researchers found they could turn the smart speakers into surveillance devices—if they could get their own…
Invisible Mouse Clicks Let Hackers Burrow Deep into MacOS
A former NSA hacker finds a new way malware can take control of a Mac's mouse…