Rising Prices, Rising Risks: Crypto Hacks Skyrocket To $1.6 Billion, Report
Crypto investors and platforms are facing a growing threat as the value of crypto hacks has nearly doubled in the…
The Slow-Burn Nightmare of the National Public Data Breach
Data breaches are a seemingly endless scourge with no simple answer, but the breach in recent months of the background-check…
Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App
Google's flagship Pixel smartphone line touts security as a centerpiece feature, offering guaranteed software updates for seven years and running…
Want to Win a Bike Race? Hack Your Rival’s Wireless Shifters
Shimano says it has provided that firmware update to the professional cycling teams that use its components. But it says…
Your Gym Locker May Be Hackable
Thousands of electronic lockers found in gyms, offices, and schools could be vulnerable to attacks by criminals using cheap hacking…
The best hacks and security research from Black Hat and Def Con 2024
Thousands of hackers, researchers and security professionals descended on the Black Hat and Def Con security conferences in Las Vegas…
How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards
Finally, HID says that “to its knowledge,” none of its encoder keys have leaked or been distributed publicly, and “none…
The Hacker Who Hunts Video Game Speedrunning Cheaters
The night before Cecil's Defcon talk, Maselewski wrote in a final email to WIRED that he believes those alleging that…
Flaws in Ubiquitous ATM Software Could Have Let Attackers Take Over Cash Machines
There is a grand tradition at the annual Defcon security conference in Las Vegas of hacking ATMs. Unlocking them with…
Tricky Web Timing Attacks Are Getting Easier to Use—and Abuse
Researchers have long known that they can glean hidden information about the inner workings of a website by measuring the…