Chrysler’s Solution To The Jeep Hack Is 1.4 Million USB Drives

You've probably read the WIRED story "Hackers Remotely Kill a Jeep on the Highway—With Me in It" by now. Either way, it was scary as hell. Today, the company behind Jeep has finally taken action and

Notes From Crazytown, Day Three: Black Hat Breakdown

So far this week, at Black Hat, I have learned to deeply mistrust: passwords, chip-and-PIN cards, USB devices, HTTPS connections, more than two billion phones, governments worldwide, all human societi

SourceClear Raises $1.5M Seed Round For Its Software Security Platform

Modern development frameworks and libraries can make writing software quite a bit easier, but at the same time, hackers are also aware of this and they specifically target popular frameworks to find p

Weev Needs To Walk

Andrew "<a href="https://beta.techcrunch.com/tag/Weev">Weev</a>" Auernheimer is a troll, but he's not a criminal. This is clear. In his recent appearance in federal appellate court in Philadelphia, t

Mt. Gox Source Code Leaked By Hackers Along With Team Information, Customer Data

Those interested in building a Bitcoin exchange should look no further than this chunk of source code posted by a “Russian leaker” called nanashi_. It alleges to contain the 1,700-line sou

Hardware Needs To Be Harder To Hack

News that <a target="_blank" href="http://krebsonsecurity.com/2014/02/time-to-harden-your-hardware/">Linksys and Belkin</a> hardware was inherently insecure and could easily allow hackers to access yo

Handcuffs For Hacker Schools? Why A “Code Of Conduct” For Coding Bootcamps Could Actually Be Good For The Ecosystem

The explosion in both online and offline programming platforms over the last year has made one thing clear: Learning to code is hot. (With two “t’s.”) Well, that and the fact that ou

Four Indicted For Installing Undetectable Card Skimmers Inside Gas Pumps

The New York County District Attorney announced that the NYPD arrested four men on March 21, 2013 suspected of using concealed card skimming systems to grab card numbers and PINs from hundreds of vict

Snapchat Makes You “Find The Ghosts” To Keep Hackers From Stealing Your Phone Number [Update: But It Fails]

Snapchat now verifies new users aren't robots by making them choose its ghost mascot in images. It's an attempt to keep out hackers who could steal phone numbers by exploiting a leaked database of det

The War On Hackers

Corey Thuen was a developer at the Idaho National Laboratory who helped to develop a network-visualization tool called Sophia. Then Battelle Energy, the company that <a target="_blank" href="http://ww

A Way To Save BlackBerry

The first smartphone I owned was a Nokia communicator, which I chose because the C++ dev kit gave me the most freedom. When the iPhone appeared I did not switch, because mandatory App Store signing to

Deep Web Users Are Ready To Launch Silk Road 2.0

In an <a target="_blank" href="http://atlantisblog.org/silk-road-subdued-but-this-ex-blackmarket-employee-believes-they-only-released-a-monster/">interesting post-mortem release</a> by the creators of

State Machinery For State Machines

My name is Andrew Auernheimer. I used to believe problems could be solved with criticism and discourse in our marketplace of ideas. Three years ago I incremented an integer on a public web API and ana

Hacker Andrew Auernheimer Placed In Solitary Confinement For Tweeting From Prison

Andrew "Weev" Auernheimer has been placed in "administrative segregation," prison shorthand for solitary confinement for "investigative purposes." Supporters believe he was locked down and given no

SecPoint Will Allow You To Access The Secretive Silk Road Black Market From Any Browser

Needs some pharmacologicals? Dirty deeds done dirt cheap? There's an app (or website) for that. For years, the Silk Road has been a source for black market dealings. Hidden on the Tor network, <a

Security Expert Brian Krebs Faced A Real-Life SWATing After Posting About Russian Cybercrime Site

Security writer Brian Krebs' phone was spoofed and <a target="_blank" href="http://krebsonsecurity.com/2013/03/the-world-has-no-room-for-cowards/">a SWAT team called to his home last week</a> by hacke

GitHub Hit With A DDoS Attack, Second In Two Days, And “Major Service Outage” [Update: GitHub Back Up, No Data Breached]

Services on code-sharing site <a target="_blank" href="http://www.github.com">GitHub</a> have been disrupted for over an hour in what started as a "<a target="_blank" href="https://status.github.com/m

You May Take Away My Freedom, But I’ll Always Have My Crunchie!

On June 14th, 2010, Michael Arrington <a href="https://beta.techcrunch.com/2010/06/14/were-awarding-goatse-security-a-crunchie-award-for-public-service/">awarded a Crunchie</a> to two members of Goat

EU’s New Cybersecurity Directive Orders States To Set Up Emergency Response Teams, Better Risk Mgmt For Verticals

With hacking and malware on the rise, Europe is cracking down on cybersecurity: today the European Commission, working with the High Representative of the Union for Foreign Affairs and Security Policy

“Evasi0n” Overloads Servers As Over 270,000 People Download The New Jailbreak For iOS 6.0/6.1 Devices, Including iPhone 5

Jailbreaking has returned, and already servers are overloaded. Today, a group of iOS hackers styling themselves as <a target="_blank" href="https://twitter.com/evad3rs">the Evad3rs team</a> has releas
Load More