4 Agosto 2020Sicurezza Hackers Could Use IoT Botnets to Manipulate Energy Markets On a Friday morning in the fall of 2016, the Mirai botnet wrecked havoc on internet infrastructure, causing major website outages across […]
4 Agosto 2020Sicurezza Hackers Are Building an Army of Cheap Satellite Trackers The more NyanSat ground stations are out there, the more they can do together, communicating with known satellites or even probing the […]
1 Agosto 2020Sicurezza Rite Aid Used Facial Recognition in Stores for Nearly a Decade Just over two weeks after an unprecedented hack led to the compromise of the Twitter accounts of Bill Gates, Elon Musk, Barack […]
30 Luglio 2020Sicurezza Children Stream on Twitch—Where Potential Predators Find Them Similar spot checks of Twitch’s less popular competitors, YouTube Gaming and Facebook Gaming, turned up far fewer instances of apparent children livestreaming. […]
25 Luglio 2020Sicurezza Russia Tested a Space Weapon Last Week This week, WIRED broke the news of a Russian military intelligence hacking campaign that dates all the way back to December 2018. […]
22 Luglio 2020Sicurezza Apple’s Hackable iPhones Are Finally Here Last August, Apple announced that it would distribute special iPhones to elite security researchers. The idea was to offer a device that […]
18 Luglio 2020Sicurezza Who Pulled Off the Twitter Hack? On Wednesday, an unprecedented Twitter hack saw the accounts of Elon Musk, Barack Obama, Joe Biden, Jeff Bezos, Bill Gates, Apple, Uber, […]
17 Luglio 2020Sicurezza The Anatomy of a Cisco Counterfeit Shows Its Dangerous Potential When an I.T. company asked Finnish cybersecurity firm F-Secure to analyze some of its equipment last fall, the client wasn’t worried about […]
16 Luglio 2020Sicurezza Iranian Spies Accidentally Leaked Videos of Themselves Hacking The most telling element of the video, Wikoff says, is the speed the hacker demonstrates in exfiltrating the accounts’ information in real-time. […]
14 Luglio 2020Sicurezza Google Moves to Secure the Cloud From Itself Sensitive data needs to be encrypted both at rest and in transit—that is, when it’s passively stored and when it’s being sent […]