You are hereTechnology

Technology


The Unpatchable Malware That Infects USBs Is Now on the Loose

The Unpatchable Malware That Infects USBs Is Now on the LooseTwo independent researchers say that publicly releasing the code that enables BadUSB attacks will hasten a fix. The post The Unpatchable Malware That Infects USBs Is Now on the Loose appeared first on WIRED.  read more »

Cops Are Handing Out Spyware to Parents—With Zero Oversight

Cops Are Handing Out Spyware to Parents—With Zero OversightMere days after a government crackdown on a spyware manufacturer comes the startling revelation that law enforcement agencies have been purchasing commercial spyware themselves and handing it out to the public for free. Police departments around the country have been distributing thousands of free copies of spyware to parents to monitor their children’s activity, a […]  read more »

The Criminal Indictment That Could Finally Hit Spyware Makers Hard

The Criminal Indictment That Could Finally Hit Spyware Makers HardThe indictment this week of the man behind an app designed for surreptitiously monitoring cellphone activity is only the second federal case filed against someone involved in the commercial sale of so-called stalkingware. But the case could have negative implications for others who make and sell spyware and similar snooping tools, experts hope.  read more »

The $1,200 Machine That Lets Anyone Make a Metal Gun at Home

The $1,200 Machine That Lets Anyone Make a Metal Gun at HomeWhen Cody Wilson revealed the world’s first fully 3-D printed gun last year, he showed that the “maker” movement has enabled anyone to create a working, lethal firearm with a click in the privacy of his or her garage. Now he’s moved on to a new form of digital DIY gunsmithing. And this time the […]  read more »

How RAM Scrapers Work: The Sneaky Tools Behind the Latest Credit Card Hacks

 The Sneaky Tools Behind the Latest Credit Card HacksIn the world of hacking, every malicious tool has its heyday---that period when it rules the underground forums and media headlines and is the challenger keeping computer security pros on their toes. Viruses and worms have each had their day in the spotlight. Remote-access Trojans, which allow a hacker to open and maintain a secret backdoor on infected systems, have had their reign as well.  read more »

Hackers Are Already Using the Shellshock Bug to Launch Botnet Attacks

Hackers Are Already Using the Shellshock Bug to Launch Botnet AttacksWith a bug as dangerous as the "shellshock" security vulnerability discovered yesterday, it takes less than 24 hours to go from proof-of-concept to pandemic.  read more »

Why the Heyday of Credit Card Fraud Is Almost Over

Why the Heyday of Credit Card Fraud Is Almost OverIn 1960, an IBM engineer named Forrest Parry was developing a new type of ID card for the CIA when he had an epiphany: Why not make each card a tiny data storage device in and of itself? He cut a short length of half-inch wide magnetic tape from a reel and wrapped it around […]  read more »

The Internet Braces for the Crazy Shellshock Worm

The Internet Braces for the Crazy Shellshock WormA nasty bug in many of the world’s Linux and Unix operating systems could allow malicious hackers to create a computer worm that wreaks havoc on machines across the globe, security experts say. The flaw, called Shellshock, is being compared to last spring’s Heartbleed bug because it lets attackers do some nasty stuff—in this case, […]  read more »