computer security

Ransomware Attacks Are Testing Resolve of Cities Across America

Ransomware Attacks Are Testing Resolve of Cities Across America

As hackers lock up networks that power police forces and utilities, municipalities must operate with hobbled computer systems, and decide whether to pay ransoms.
5 Indicted in Identity Theft Scheme That Bilked Millions From Veterans

5 Indicted in Identity Theft Scheme That Bilked Millions From Veterans

The defendants obtained Social Security numbers and bank account information from a technician who worked for the military, the Justice Department said.

Yubico launches its dual USB-C and Lightning two-factor security key

Almost two months after it was first announced, Yubico has launched the YubiKey 5Ci, a security key with dual support for both iPhones, Macs and other USB-C compatible devices. Yubico’s latest Yubikey
Ransomware Attack Hits 22 Texas Towns, Authorities Say

Ransomware Attack Hits 22 Texas Towns, Authorities Say

The state declined to say which towns were affected by the coordinated cyberattack. But one expert said it could signal more such attacks in the future.
Ransomware Attack Hits 22 Texas Towns, Authorities Say

Ransomware Attack Hits 22 Texas Towns, Authorities Say

The state declined to say which towns were affected by the coordinated cyberattack. But one expert said it could signal more such attacks in the future.
Ransomware Attack Hits 22 Texas Towns, Authorities Say

Ransomware Attack Hits 22 Texas Towns, Authorities Say

The state declined to say which towns were affected by the coordinated cyberattack. But one expert said it could signal more such attacks in the future.
Ransomware Attack Hits 22 Texas Towns, Authorities Say

Ransomware Attack Hits 22 Texas Towns, Authorities Say

The state declined to say which towns were affected by the coordinated cyberattack. But one expert said it could signal more such attacks in the future.

Privacy researchers devise a noise-exploitation attack that defeats dynamic anonymity

Privacy researchers in Europe believe they have the first proof that a long-theorised vulnerability in systems designed to protect privacy by aggregating and adding noise to data to mask individual

The Week in Tech: Are Lawmakers Too Eager to Weaken Big Tech’s Legal Shield?

Revising Section 230 could change the internet as we know it. How about policy decisions based on sound evidence?

US Cyber Command has publicly posted malware linked to a North Korea hacking group

U.S. Cyber Command, the sister division of the National Security Agency focused on offensive hacking and security operations, has released a set of new samples of malware linked to North Korean

What security pros need to know from Black Hat & Def Con 2019

Black Hat and Def Con came and went as quickly as it ever does. The week-long pair of back-to-back conferences, referred to as “hacker summer camp,” draws in the security crowd from across the world
I Shared My Phone Number. I Learned I Shouldn’t Have.

I Shared My Phone Number. I Learned I Shouldn’t Have.

Our personal tech columnist asked security researchers what they could find out about him from just his cellphone number. Quite a lot, it turns out.
I Shared My Phone Number. I Learned I Shouldn’t Have.

I Shared My Phone Number. I Learned I Shouldn’t Have.

Our personal tech columnist asked security researchers what they could find out about him from just his cellphone number. Quite a lot, it turns out.
I Shared My Phone Number. I Learned I Shouldn’t Have.

I Shared My Phone Number. I Learned I Shouldn’t Have.

Our personal tech columnist asked security researchers what they could find out about him from just his cellphone number. Quite a lot, it turns out.

Capital One Hacking Suspect Had Data From Other Targets, Officials Say

Prosecutors said they found the stolen material from 30 organizations on servers in the bedroom of the accused hacker.

Capital One Hacking Suspect Had Data From Other Targets, Officials Say

Prosecutors said they found the stolen material from 30 organizations on servers in the bedroom of the accused hacker.
Giant Hacking Attack in Bulgaria Raises Suspicion of Russian Meddling

Giant Hacking Attack in Bulgaria Raises Suspicion of Russian Meddling

Whoever was responsible, experts say, the episode raised serious concerns about the state of Bulgaria’s cybersecurity.
Russia Suspected by Some in Giant Bulgaria Hack

Russia Suspected by Some in Giant Bulgaria Hack

Whoever was responsible, experts say, the episode raised serious concerns about the state of Bulgaria’s cybersecurity.
They Stole Your Files, You Don’t Have to Pay the Ransom

They Stole Your Files, You Don’t Have to Pay the Ransom

The F.B.I. should follow the example of European law enforcement and help victims of ransomware decrypt their data.
This hacker’s iPhone charging cable can hijack your computer

This hacker’s iPhone charging cable can hijack your computer

Most people don’t think twice about picking up a phone charging cable and plugging it in. But one hacker’s project wants to change that and raise awareness of the dangers of potentially malicious