Showing only posts by WIRED. Show all posts.

Why the US government’s overreliance on Microsoft is a big problem

Source

Enlarge (credit: Joan Cros via Getty ) When Microsoft revealed in January that foreign government hackers had once again breached its systems, the news prompted another round of recriminations about the security posture of the world’s largest tech company. Despite the angst among policymakers, security experts, and competitors, Microsoft …

Change Healthcare faces another ransomware threat—and it looks credible

Source

Enlarge (credit: iStock / Getty Images Plus ) For months, Change Healthcare has faced an immensely messy ransomware debacle that has left hundreds of pharmacies and medical practices across the United States unable to process claims. Now, thanks to an apparent dispute within the ransomware criminal ecosystem, it may have just …

London Underground is testing real-time AI surveillance tools to spot crime

Source

Enlarge (credit: John Keeble/Getty Images ) Thousands of people using the London Underground had their movements, behavior, and body language watched by AI surveillance software designed to see if they were committing crimes or were in unsafe situations, new documents obtained by WIRED reveal. The machine-learning software was combined …

A startup allegedly “hacked the world.” Then came the censorship—and now the backlash.

Source

Enlarge (credit: WIRED staff/Getty Images ) Hacker-for-hire firms like NSO Group and Hacking Team have become notorious for enabling their customers to spy on vulnerable members of civil society. But as far back as a decade ago in India, a startup called Appin Technology and its subsidiaries allegedly played …

How Microsoft’s cybercrime unit has evolved to combat increased threats

Source

Microsoft's Cybercrime Center. (credit: Microsoft) Governments and the tech industry around the world have been scrambling in recent years to curb the rise of online scamming and cybercrime. Yet even with progress on digital defenses, enforcement, and deterrence, the ransomware attacks, business email compromises, and malware infections keep on …

The International Criminal Court will now prosecute cyberwar crimes

Source

Enlarge / Karim Khan speaks at Colombia's Special Jurisdiction for Peace during the visit of the Prosecutor of the International Criminal Court in Bogota, Colombia, on June 6, 2023. (credit: Long Visual Press/Getty ) For years, some cybersecurity defenders and advocates have called for a kind of Geneva Convention for …

How China gets free intel on tech companies’ vulnerabilities

Source

Enlarge (credit: Wired staff; Getty Images) For state-sponsored hacking operations, unpatched vulnerabilities are valuable ammunition. Intelligence agencies and militaries seize on hackable bugs when they're revealed—exploiting them to carry out their campaigns of espionage or cyberwar—or spend millions to dig up new ones or to buy them …

Crypto botnet on X is powered by ChatGPT

Source

Enlarge (credit: sakchai vongsasiripat/Getty Image) ChatGPT may well revolutionize web search, streamline office chores, and remake education, but the smooth-talking chatbot has also found work as a social media crypto huckster. Researchers at Indiana University Bloomington discovered a botnet powered by ChatGPT operating on X—the social network …

Our health care system may soon receive a much-needed cybersecurity boost

Source

Enlarge (credit: Lorenzo Capunata/Getty ) The Advanced Research Projects Agency for Health (Arpa-H), a research support agency within the United States Department of Health and Human Services, said today that it is launching an initiative to find and help fund the development of cybersecurity technologies that can specifically improve …

Ongoing scam tricks kids playing Roblox and Fortnite

Source

Enlarge (credit: Savusia Konstantin | Getty Images ) Thousands of websites belonging to US government agencies, leading universities, and professional organizations have been hijacked over the last half decade and used to push scammy offers and promotions, new research has found. Many of these scams are aimed at children and attempt …

An Apple malware-flagging tool is “trivially” easy to bypass

Source

Enlarge (credit: Getty Images ) One of your Mac's built-in malware detection tools may not be working quite as well as you think. At the Defcon hacker conference in Las Vegas, longtime Mac security researcher Patrick Wardle presented findings on Saturday about vulnerabilities in Apple's macOS Background Task Management mechanism …

Unlimited miles and nights: Vulnerability found in rewards programs

Source

Enlarge (credit: Jose A. Bernat Bacete ) Travel rewards programs like those offered by airlines and hotels tout the specific perks of joining their club over others. Under the hood, though, the digital infrastructure for many of these programs—including Delta SkyMiles, United MileagePlus, Hilton Honors, and Marriott Bonvoy—is …

It’s a hot 0-day summer for Apple, Google, and Microsoft security fixes

Source

Enlarge (credit: WIRED staff ) The summer patch cycle shows no signs of slowing down, with tech giants Apple, Google, and Microsoft releasing multiple updates to fix flaws being used in real-life attacks. July also saw serious bugs squashed by enterprise software firms SAP, Citrix, and Oracle. Here’s everything …

Researchers find deliberate backdoor in police radio encryption algorithm

Source

Enlarge (credit: Evgen_Prozhyrko via Getty ) For more than 25 years, a technology used for critical data and voice radio communications around the world has been shrouded in secrecy to prevent anyone from closely scrutinizing its security properties for vulnerabilities. But now it’s finally getting a public airing thanks …

The US Navy, NATO, and NASA are using a shady Chinese company’s encryption chips

Source

Enlarge (credit: Bet_Noire/Getty ) From TikTok to Huawei routers to DJI drones, rising tensions between China and the US have made Americans—and the US government—increasingly wary of Chinese-owned technologies. But thanks to the complexity of the hardware supply chain, encryption chips sold by the subsidiary of a …

Millions of PC motherboards were sold with a firmware backdoor

Source

Enlarge (credit: BeeBright/Getty Images) Hiding malicious programs in a computer’s UEFI firmware, the deep-seated code that tells a PC how to load its operating system, has become an insidious trick in the toolkit of stealthy hackers. But when a motherboard manufacturer installs its own hidden backdoor in …

Ransomware attacks have entered a heinous new phase

Source

Enlarge (credit: Don Farrall/Getty Images) In February, attackers from the Russia-based BlackCat ransomware group hit a physician practice in Lackawanna County, Pennsylvania, that's part of the Lehigh Valley Health Network (LVHN). At the time, LVHN said that the attack “involved” a patient photo system related to radiation oncology …

Ukraine suffered more data-wiping malware than anywhere, ever

Source

Enlarge (credit: Celestino Arce/Getty Images) Amidst the tragic toll of Russia's brutal and catastrophic invasion of Ukraine, the effects of the Kremlin's long-running campaign of destructive cyberattacks against its neighbor have often—rightfully—been treated as an afterthought. But after a year of war, it's becoming clear that …

Twitter’s two-factor authentication change “doesn’t make sense”

Source

Enlarge (credit: Bloomberg via Getty Images ) Twitter announced Friday that as of March 20, it will only allow its users to secure their accounts with SMS-based two-factor authentication if they pay for a Twitter Blue subscription. Two-factor authentication, or 2FA, requires users to log in with a username and …

A widespread logic controller flaw raises the specter of Stuxnet

Source

Enlarge In 2009, the computer worm Stuxnet crippled hundreds of centrifuges inside Iran’s Natanz uranium enrichment plant by targeting the software running on the facility’s industrial computers, known as programmable logic controllers. The exploited PLCs were made by the automation giant Siemens and were all models from …

Mystery hackers are “hyperjacking” targets for insidious spying

Source

Enlarge (credit: Marco Rosario Venturini Autieri/Getty Images) For decades, virtualization software has offered a way to vastly multiply computers’ efficiency, hosting entire collections of computers as “virtual machines” on just one physical machine. And for almost as long, security researchers have warned about the potential dark side of …

End-to-end encryption’s central role in modern self-defense

Source

Enlarge (credit: Getty Images ) A number of course-altering US Supreme Court decisions last month—including the reversal of a constitutional right to abortion and the overturning of a century-old limit on certain firearms permits—have activists and average Americans around the country anticipating the fallout for rights and privacy …

page 1 | older articles »