You are hereTechnology

Technology


Kevin Mitnick, Once the World’s Most Wanted Hacker, Is Now Selling Zero-Day Exploits

Kevin Mitnick, Once the World’s Most Wanted Hacker, Is Now Selling Zero-Day ExploitsAs a young man, Kevin Mitnick became the world’s most notorious black hat hacker, breaking into the networks of companies like IBM, Nokia, Motorola, and other targets. After a stint in prison, he reinvented himself as a white hat hacker, selling his skills as a penetration tester and security consultant. With his latest business venture, […]  read more »

Nude-Photo Hackers Are Sad Apple Ruined Their Fun

Nude-Photo Hackers Are Sad Apple Ruined Their FunThe fixes Apple bolted on to iCloud’s security following its epic spill of stolen celebrity nudes may be far from perfect. But give Apple credit: It made a lot of sex-starved hackers very unhappy. The post Nude-Photo Hackers Are Sad Apple Ruined Their Fun appeared first on WIRED.  read more »

Arizona Could Send You to Prison for Sharing Nude Celebrity Pictures

Arizona Could Send You to Prison for Sharing Nude Celebrity PicturesIf you shared or re-published any of the images of nude celebrities that leaked online earlier this month, you could be charged with a felony under a new Arizona law. The post Arizona Could Send You to Prison for Sharing Nude Celebrity Pictures appeared first on WIRED.  read more »

MIT Students Battle State’s Demand for Their Bitcoin Miner’s Source Code

MIT Students Battle State’s Demand for Their Bitcoin Miner’s Source CodeFour MIT students behind an award-winning Bitcoin mining tool will face off against New Jersey state authorities in court today when they attempt to fight back against a subpoena demanding their source code. The Electronic Frontier Foundation is representing 19-year-old MIT student Jeremy Rubin and three classmates in a remarkable case that stands out for […]  read more »

Upcoming Book Charts Anonymous’ Rise, From Silly Pranks to Serious Power

Upcoming Book Charts Anonymous’ Rise, From Silly Pranks to Serious PowerHow did Anonymous make the leap from a rather amusing anti-Scientology society to a global protest movement whose force was felt in the highest circles of power? Well, as Anonymous anthropologist Gabriela Colemen describes it in her upcoming book on the hacking collective, Hacker, Hoaxer, Whistleblower, Spy: The Story of Anonymous, it was a bit of a fluke.  read more »

Google and Apple Won’t Unlock Your Phone, But a Court Can Make You Do It

Google and Apple Won’t Unlock Your Phone, But a Court Can Make You Do ItSilicon Valley's smartphone snitching has come to an end. Apple and Google have promised that the latest versions of their mobile operating systems make it impossible for them to unlock encrypted phones, even when compelled to do so by the government.  read more »

The Dark Web Gets Darker With Rise of the ‘Evolution’ Drug Market

The Dark Web Gets Darker With Rise of the ‘Evolution’ Drug MarketEvolution’s popularity has been driven not only by a more secure and professional operation than its competitors, but also by a more amoral approach to the cryptomarket than the strict libertarian ethos the Silk Road preached.  read more »

Despite Apple’s Privacy Pledge, Cops Can Still Pull Data Off a Locked iPhone

Despite Apple’s Privacy Pledge, Cops Can Still Pull Data Off a Locked iPhoneA reminder to iPhone owners cheering Apple’s latest privacy win: Just because Apple will no longer help police to turn your smartphone inside out doesn’t mean it can prevent the cops from vivisecting the device on their own. On Wednesday evening Apple made news with a strongly-worded statement about how it protects users’ data from […]  read more »

Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying

Middle-School Dropout Codes Clever Chat Program That Foils NSA SpyingThe best hope of shielding your metadata from the NSA was invented by a middle-school dropout in his spare time. The post Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying appeared first on WIRED.  read more »