Categories » Vulnerabilities
In the beginning there were USB worms. Now, the threat has migrated to DVDs. Continue reading
A hacker group attacks the official website of Malaysia Airlines, but the company says bookings and user data are not compromised. Continue reading
Adobe has released an emergency patch for a flaw in its Flash software that was being widely exploited by thieves. Continue reading
With built-in USB hub and radio, cable can spy or launch man-in-middle attacks. Continue reading
SnapShot from Progressive Insurance, contains few anti-hacking defenses. Continue reading
Attack on Asian site spawns super sneaky malware attack on online gamers. Continue reading
The Information Commissioner’s Office warns online shoe retailer Office to take better care of customer data, following a breach. Continue reading
Snowden docs show NSA tapped into S. Korean exploits of N. Korean networks. Continue reading
Malware droppers stored on site disguised as antique Flash updaters. Continue reading
Google says 90 days is enough. Microsoft wants to wait for patches. Continue reading
Lizard Squad’s for-hire services made runs on thousands of home routing devices. Continue reading
Misconfigured default permissions on files create a way to get root on Red Star OS. Continue reading
Ukraine points the finger at Russia for German hack attack but do they have any evidence for the claims? Continue reading
The attack marks only the second confirmed incident in which a wholly digital hack created physical destruction of equipment. The post A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever appeared first on WIRED. Continue reading
Comey again expresses concern about digital communications “going dark” with encryption. Continue reading
Comey now says that the hackers in the attack failed on multiple occasions to use the proxy servers that bounce their Internet connection through an obfuscating computer somewhere else in the world, revealing IP addresses that tied them to the North Korean government.
The post FBI Director: Sony’s ‘Sloppy’ North Korean Hackers Revealed Their IP Addresses appeared first on WIRED.
New technique allows websites to bypass privacy mode unless users take special care. Continue reading
2014 was a really bad year for software vulnerabilities. These five are some of the worst security threats of the past 12 months. The post The 5 Most Dangerous Software Bugs of 2014 appeared first on WIRED. Continue reading
With each passing year, data breaches get bigger and more invasive. But 2014 saw a new twist to the breach phenomenon with the Sony hack. The attackers didn’t just steal data, they scorched Sony’s digital earth as they exited its networks, wiping data from servers and leaving administrators to clean up the mess and restore systems.
The post The Year’s Worst Hacks, From Sony to Celebrity Nude Pics appeared first on WIRED.
Unidentified hackers have been releasing internal documents from Sony Pictures Entertainment. Renee Montagne talks to Kim Zetter, a senior staff reporter at Wired magazine, about the attack. Continue reading