Given the severity of the coronavirus outbreak, a previously unknown virus that has been declared a public health emergency of global concern, it was inevitable that the internet would have a leading role as this global drama played out.
Paying hackers is no bad thing. Which is why PayPal recently paid $15,300 (£11,700) to one, Tesla is offering $500,000 (£380,000) to any that can hack a Tesla Model 3, and Apple is prepared to cough up $1.5 million (£1.1 million) to iPhone hackers.
One week after the United Nations called for an investigation into the claims that Jeff Bezos’ smartphone was hacked by Saudi Crown Prince Mohammed bin Salman, a claim that I first reported in March 2019, another investigation has revealed that the UN itself has been hacked.
In the cyber world, as elsewhere, bad guys have an annoying tendency to do bad things. And so if you leave yourself open, you will be punished. This is the thinking behind the latest report from the cyber security research team at Check Point, disclosing a vulnerability in the software behind video conferencing platform Zoom.
In 2013, the semi-secret research and development facility Google X started selling a prototype of Google Glass. This wearable device was arguably the world’s first supplemental reality "smart eyeglasses."
The task of collecting relevant information, organizing it, and piecing it together in a way that tells a story seems like an overwhelming and nearly impossible task. Yet, this is what intelligence analysts must do.
Have you heard of SIM swapping? The nasty form of attack was documented by ZDNet writer Matthew Miller last June, who detailed the horror show unfolding after he found his services had been hacked and his bank charged $25,000 by an attacker purchasing Bitcoin.
North Korean hackers are using legitimate-looking LinkedIn and Telegram profiles in order to target the cryptocurrency wallets of macOS users, cybersecurity experts at Chainalysis have warned.
Huawei is a security threat to the west, says the U.S., because it might be instructed to collect intelligence at Beijing’s behest or shutdown swathes of critical infrastructure in the event of any political or military conflict.