- The WIP hosted #LocalVoicesTalk about Women in Islam, a Twitter event. July 22, 2014
- Infrastructure Hackers, Script Kiddies and “Watchdogs”: A Round-up of Monsters Under the Bed from CIS/MS-ISAC June 5, 2014
- Recent Activity from The European Cyber Army (ECA) April 15, 2014
- Summary of 2013 Malware Development March 26, 2014
- Turkey Thrashes Twitter, Leaks put Gov in a Twist March 21, 2014
- Commerce Dept. Cans ICANN March 21, 2014
- Point of Sale Target’ed, Millions of Credit Cards Scraped. February 12, 2014
- Hotels May Become New Data Breach Point February 12, 2014
- New White House Initiative Pledges $750 Million for Student Technology February 12, 2014
- Mask/Careto Unmasked, Shadowy Spanish Spybots Slink into Sunset February 12, 2014
Categories » News
Proof-of-concept exploit against LastPass could easily be extended to other apps. Continue reading
Intelligence unit keeps databases of activities of journalists, protestors. Continue reading
City said the original request put plans for police body-cams at risk. Continue reading
Search giant Google has unveiled an experiment that lets people pay to visit sites rather than see adverts. Continue reading
New docs: Prosecutors offered one-stop shop for seized phone data in Virginia. Continue reading
Fifteen people have been arrested, including four in the UK, in connection with the hijacking of computers. Continue reading
Hundreds of thousands of Android phones have been infected with malware that uses handsets to send spam and buy event tickets in bulk. Continue reading
A cage containing a chemical that holds electrons. Continue reading
In 1989, the year the Berlin Wall began to fall, American artist Jim Sanborn was busy working on his Kryptos sculpture, a cryptographic puzzle wrapped in a riddle that he created for the CIA’s headquarters and that has been driving amateur and professional cryptographers mad ever since. To honor the 25th anniversary of the Wall’s […]
The post Finally, a New Clue to Solve the CIA’s Mysterious Kryptos Sculpture appeared first on WIRED.
Data privacy watchdogs are warning the public about a Russian website that provides links to breached webcams, baby monitors and CCTV feeds. Continue reading
A charity is to give away 2,000 Talking Book audio computers to some of Ghana’s poorest communities after securing funds from Unicef and ARM. Continue reading
The eBay-style contraband bazaar Evolution has grown more than 50 percent in drug offerings since September.
The post How the Dark Web’s New Favorite Drug Market Is Profiting From Silk Road 2’s Demise appeared first on WIRED.
Jelle Martens Eight years ago, Polish hacker Joanna Rutkowska was experimenting with rootkits—tough-to-detect spyware that infects the deepest level of a computer’s operating system—when she came up with a devious notion: What if, instead of putting spyware inside a victim’s computer, you put the victim’s computer inside the spyware? At the time, a technology known […]
The post How Splitting a Computer Into Multiple Realities Can Protect You From Hackers appeared first on WIRED.
Amnesty International has released a program that can spot spying software used by governments to monitor activists and political opponents. Continue reading
With the rise and fall of the Silk Road—and then its rise again and fall again—the last couple of years have cast new light on the Dark Web. But when a news organization as reputable as 60 Minutes describes the Dark Web as “a vast, secret, cyber underworld” that accounts for “90% of the Internet,” it’s time for a refresher.
Tonight, the lame duck senate still run by the democrats voted on the USA Freedom Act, a bipartisan-backed bill to usher in NSA reform. The post Critical NSA Reform Bill Fails in the Senate appeared first on WIRED. Continue reading
Some telecom analysts view Project Loon, Google’s effort to beam Internet signals from high-altitude balloons, as a threat to incumbent carriers. But Google wants to partner rather than compete, and some large wireless players have stepped forward. Continue reading