‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections
In a background statement to WIRED, AMD emphasized the difficulty of exploiting Sinkclose: To take advantage of the vulnerability, a…
Security bugs in ransomware leak sites helped save six companies from paying hefty ransoms
A security researcher says six companies were saved from having to pay potentially hefty ransom demands, in part thanks to…
Computer Crash Reports Are an Untapped Hacker Gold Mine
When a bad software update from the security firm CrowdStrike inadvertently caused digital chaos around the world last month, the…
Tricky Web Timing Attacks Are Getting Easier to Use—and Abuse
Researchers have long known that they can glean hidden information about the inner workings of a website by measuring the…
Microsoft’s AI Can Be Turned Into an Automated Phishing Machine
Among the other attacks created by Bargury is a demonstration of how a hacker—who, again, must already have hijacked an…
USPS Text Scammers Duped His Wife, So He Hacked Their Operation
Smith trawled Reddit and other online sources to find people reporting the scam and the URLs being used, which he…
Watch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokes
“I think I've created the first laser microphone that's actually modulated in the radio frequency domain,” Kamkar says. “Once I…
Inside the Dark World of Doxing for Profit
Since the early 1990s, people have used doxing as a toxic way to strike digital revenge—stripping away someone’s anonymity by…
A Flaw in Windows Update Opens the Door to Zombie Exploits
New research being presented at the Black Hat security conference in Las Vegas today shows that a vulnerability in Windows…
A New Plan to Break the Cycle of Destructive Critical Infrastructure Hacks
“It’s not just that the water goes out, it’s that when the sole wastewater facility in your community is down…