Skip to main content Enlarge / CIA headquarters. In early 2017, WikiLeaks began publishing details of top-secret CIA hacking tools that researchers soon confirmed were part of a large tranche of confidential documents stolen from one of the agency�..Read More »
Skip to main content Enlarge / A mobile PC processor code-named Tiger Lake. It will be the first CPU to offer a security capability known as Control-Flow Enforcement Technology. The history of hacking has largely been a back-and-forth game, with atta..Read More »
Skip to main content Enlarge / A comparison of an original and deepfake video of Facebook CEO Mark Zuckerberg. We're lucky that deepfake videos aren’t a big problem yet. The best deepfake detector to emerge from a major Facebook-led effort to co..Read More »
Skip to main content Enlarge The list of sophisticated eavesdropping techniques has grown steadily over years: wiretaps, hacked phones, bugs in the wall—even bouncing lasers off of a building's glass to pick up conversations inside. Now add anot..Read More »
Skip to main content Enlarge / The Knoxville City-County Building, overlooking the Tennessee River in Knoxville, Tennessee. The city of Knoxville, Tennessee, shut down large portions of its computer network on Thursday after being hit overnight by a ..Read More »
Skip to main content Enlarge / The (replica) disembodied marble head of David probably didn't need a 3M mask, but he nonetheless looked fashionable sporting it in the window of a jewelry shop in Switzerland in March 2020. 3M—which manufactures N..Read More »
Skip to main content Enlarge Honda halted manufacturing at some of its plants around the world on Tuesday after being hit by a cyberattack that’s widely reported to be ransomware.
“Honda has experienced a cyberattack that has affected production ope..
Skip to main content Enlarge Cox Communications is lowering Internet upload speeds in entire neighborhoods to stop what it considers “excessive usage,” in a decision that punishes both heavy Internet users and their neighbors.
Cox, a cable company w..
Skip to main content Late last year, David Haynes, a security engineer at the Internet infrastructure company Cloudflare, found himself gazing at a strange image. “It was pure gibberish,” he says. “A whole bunch of gray and black pixels, made by a ma..Read More »
Skip to main content Enlarge A researcher has published exploit code for a Microsoft Windows vulnerability that, when left unpatched, has the potential to spread from computer to computer with no user interaction.
So-called wormable security flaws a..