Major technology companies, including Google, Apple, and Discord, have been enabling people to quickly sign up to harmful “undress” websites, which use AI to remove clothes from real photos to make victims appear to be “nude” without their consent. More than a dozen of these deepfake websites have been using login buttons from the tech companies for months.A WIRED analysis found 16 of the biggest … [Read more...]
Notorious Iranian Hackers Have Been Targeting the Space Industry With a New Backdoor
The Iranian government-backed hacking group known as APT 33 has been active for more than 10 years, conducting aggressive espionage operations against a diverse array of public and private sector victims around the world, including critical infrastructure targets. And while the group is particularly known for strategic but technically simple attacks like “password spraying,” it has also dabbled in … [Read more...]
Telegram CEO Pavel Durov’s Arrest Linked to Sweeping Criminal Investigation
French prosecutors gave preliminary information in a press release on Monday about the investigation into Telegram CEO Pavel Durov, who was arrested suddenly on Saturday at Paris’ Le Bourget airport. Durov has not yet been charged with any crime, but officials said that he is being held as part of an investigation “against person unnamed” and can be held in police custody until Wednesday.The … [Read more...]
Pavel Durov's Arrest Leaves Telegram Hanging in the Balance
At around 8 pm on Saturday evening in France, Telegram founder and CEO Pavel Durov was arrested as he exited his private jet at Le Bourget airport, outside Paris. He was flying in from Azerbaijan. According to TF1Info, the French outlet that first broke the news of his arrest, Durov was accompanied by a bodyguard and a woman. As best as anyone can tell, he spent the night in a French jail … [Read more...]
The US Navy Has Run Out of Pants
The United States Defense Department has ideas about a dramatic strategy for defending Taiwan against a Chinese military offensive that would involve deploying an “unmanned hellscape" consisting of thousands of drones buzzing around the island nation. Meanwhile, the US National Institute of Standards and Technology announced a red-team hacking competition this week with the AI ethics nonprofit … [Read more...]
When War Came to Their Country, They Built a Map
Roman Pohorilyi was 22 when he started tracking Russian troop movements near Ukraine’s border. It was the fall of 2021, and he and a childhood friend, Ruslan Mykula, had been sharing news about foreign affairs to an audience of about 200 subscribers on a Telegram channel. It was just a hobby for them. Neither imagined that a year later their country would be in a state of absolute war with Russia, … [Read more...]
Stadiums Are Embracing Face Recognition. Privacy Advocates Say They Should Stick to Sports
Thousands of people lined up outside Citi Field in Queens, New York, on Wednesday to watch the Mets face off with the Orioles. But outside the ticketing booth, a handful of protesters handed out flyers. They were there to protest a recent Major League Baseball program, one that’s increasingly common in professional sports: using facial recognition on fans.Facial recognition companies and their … [Read more...]
The US Government Wants You—Yes, You—to Hunt Down Generative AI Flaws
At the 2023 Defcon hacker conference in Las Vegas, prominent AI tech companies partnered with algorithmic integrity and transparency groups to sic thousands of attendees on generative AI platforms and find weaknesses in these critical systems. This “red-teaming” exercise, which also had support from the US government, took a step in opening these increasingly influential yet opaque systems to … [Read more...]
An AWS Configuration Issue Could Expose Thousands of Web Apps
A vulnerability related to Amazon Web Service's traffic-routing service known as Application Load Balancer could have been exploited by an attacker to bypass access controls and compromise web applications, according to new research. The flaw stems from a customer implementation issue, meaning it isn't caused by a software bug. Instead, the exposure was introduced by the way AWS users set up … [Read more...]
The Pentagon Is Planning a Drone ‘Hellscape’ to Defend Taiwan
It has become conventional wisdom among the halls of the United States government that China will launch a full-scale invasion of Taiwan within the next few years. And when that happens, the US military has a relatively straightforward response in mind: Unleash hell.Speaking to The Washington Post on the sidelines of the International Institute for Strategic Studies’ annual Shangri-La Dialogue in … [Read more...]
Geofence Warrants Ruled Unconstitutional—but That’s Not the End of It
The 2024 US presidential election is entering its final stretch, which means state-backed hackers are slipping out of the shadows to meddle in their own special way. That includes Iran’s APT42, a hacker group affiliated with Iran’s Islamic Revolutionary Guard Corps, which Google’s Threat Analysis Group says targeted nearly a dozen people associated with Donald Trump’s and Joe Biden’s (now Kamala … [Read more...]
The Slow-Burn Nightmare of the National Public Data Breach
Data breaches are a seemingly endless scourge with no simple answer, but the breach in recent months of the background-check service National Public Data illustrates just how dangerous and intractable they have become. And after four months of ambiguity, the situation is only now beginning to come into focus with National Public Data finally acknowledging the breach on Monday just as a trove of … [Read more...]
Nearly All Google Pixel Phones Are Left Exposed by Unpatched Flaw in Hidden Android App
Google's flagship Pixel smartphone line touts security as a centerpiece feature, offering guaranteed software updates for seven years and running stock Android that's meant to be free of third-party add-ons and bloatware. On Thursday, though, researchers from the mobile device security firm iVerify are publishing findings on an Android vulnerability that seems to have been present in every Android … [Read more...]
A Single Iranian Hacker Group Targeted Both Presidential Campaigns, Google Says
When Donald Trump's presidential campaign publicly stated last week that it had been successfully targeted by Iranian hackers, the news may have initially seemed like a sign that the Middle Eastern country was particularly focused on the candidate whom it perceived to take the most hawkish approach to its regime. It's since become clearer that Iran has had the Democrats in the sights of its cyber … [Read more...]
Your Gym Locker May Be Hackable
Thousands of electronic lockers found in gyms, offices, and schools could be vulnerable to attacks by criminals using cheap hacking tools to access administrator keys, according to new research.At the Defcon security conference on Sunday, security researchers Dennis Giese and “braelynn” demonstrated a proof-of-concept attack showing how digital management keys could be extracted from lockers, … [Read more...]
Want to Win a Bike Race? Hack Your Rival’s Wireless Shifters
Professional cycling has, in its recent history, been prone to a shocking variety of cheating methods and dirty tricks. Performance-enhancing drugs. Tacks strewn on race courses. Even stealthy motors hidden inside of wheel hubs.Now, for those who fail to download a software patch for their gear shifters—yes, bike components now get software updates—there may be hacker saboteurs to contend with, … [Read more...]
Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All
If you know where to look, plenty of secrets can be found online. Since the fall of 2021, independent security researcher Bill Demirkapi has been building ways to tap into huge data sources, which are often overlooked by researchers, to find masses of security problems. This includes automatically finding developer secrets—such as passwords, API keys, and authentication tokens—that could give … [Read more...]
The Hacker Who Hunts Video Game Speedrunning Cheaters
Speedrunning video games, the competitive field of playing through digital games as quickly as possible, has in recent years been elevated into something between a virtuosic form of fingers-and-thumbs athletics and a highly technical science. The best speedruns reduce epic games meant to take dozens of hours to single-digit minutes through a combination of exploiting glitch-enabled shortcuts and … [Read more...]
Apple Prototypes and Corporate Secrets Are for Sale Online—If You Know Where to Look
It's probably been a while since anyone thought about Apple's router and network storage combo called Time Capsule. Released in 2008 and discontinued in 2018, the product has mostly receded into the sands of gadget time. So when independent security researcher Matthew Bryant recently bought a Time Capsule from the United Kingdom on eBay for $38 (plus more than $40 to ship it to the United States), … [Read more...]
Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs
Demand for graphics processing units or GPUs has exploded in recent years as video rendering and artificial intelligence systems have expanded the need for processing power. And while most of the most visible shortages (and soaring stock prices) relate to top-tier PC and server chips, mobile graphics processors are the version that everyone with a smartphone is using everyday. So vulnerabilities … [Read more...]
- « Previous Page
- 1
- 2
- 3
- 4
- …
- 35
- Next Page »