The Horrifying Vtech Hack Let Someone Download Thousands of Photos of Children

The latest details about a recent security breach at a kids’ toy company are in, and they are disturbing. A couple weeks ago, hackers successfully broke into the servers of connected toy maker Vtech and stole the personal information of nearly 5 million parents and over 200,000 kids. What we didn’t know until now: The… »Today 4:45pm11/30/15 4:45pm


The Next Big War Will Be Digital—and We’re Not Ready For It

In the 21st century the familiar form of warfare in which physical damage is meted out against the opponent’s military forces and infrastructure has become only one form of attack. Instead, states are increasingly launching non-lethal attacks against an enemy’s information systems – this is the rise of information… »Friday 3:30am11/27/15 3:30am

How Banks Use Machine Learning to Know a Crook's Using Your Credit Card Details

You’re sitting at home minding your own business when you get a call from your credit card’s fraud detection unit asking if you’ve just made a purchase at a department store in your city. It wasn’t you who bought expensive electronics using your credit card – in fact, it’s been in your pocket all afternoon. So how did… »Thursday 3:35am11/26/15 3:35am

What Police Can Learn From a Terrorist’s Discarded Mobile Phone

The dramatic raid on an apartment in the Paris suburb of Saint Denis that left two dead and eight arrested followed the discovery of a mobile phone by police that was discarded by the terrorists who days earlier had launched their bloody attack. It’s understood that the data police were able to extract from the phone… »11/24/15 3:30am11/24/15 3:30am

It’s No Secret That the Government Uses Zero Days for “Offense”

Little by little, the government is opening up about its use of computer security vulnerabilities. Last month, the NSA disclosed that it has historically “released more than 91% of vulnerabilities discovered in products that have gone through our internal review process and that are made and used in the United… »11/09/15 5:00pm11/09/15 5:00pm

Your Next Heist Needs This Cash Carrying Bag That Blocks All Tracking Signals

If Ocean’s Eleven taught us anything, it’s that planning heists is tough but entertaining. The authorities have all kinds of devices that can be used to track your stolen loot, so item number one on your planning list should be this cash-carrying sack that blocks any and all wireless tracking signals. »11/05/15 4:15pm11/05/15 4:15pm