A number of online services were impacted by what has been referred to by multiple sources as a r ...(more)...
Following vulnerabilities discovered in tools many Linux and Information Security enthusiasts use ...(more)...
Adobe has released an out of band security update for the Adobe Flash player. This is an addition ...(more)...
If you apply classic hardening rules (keep the patch level, use an AV, enable the firewall and us ...(more)...
Hello Dear Readers,
This diary comes to you by way of the real world and was taken very ...(more)...
We were notified this evening by Matt H. that Craigslist is suffering an outage of some sort ...(more)...
If you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.
We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.
Please reserve top level comments for those posting open positions.
You can see an example of acceptable posts by perusing past hiring threads.
Feedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
James Hoff's art glitches music and images with malware like NSA-created Stuxnet and the ILOVEYOU viruses.
The post This Artist’s Images Integrate Code From Malware Like Stuxnet and Flame appeared first on WIRED.
The defense attorney for one young hacker with ties to Anonymous argues prosecutors indicted his client on 44 baseless felony charges as an intimidation and smear tactic.
The post Oops: After Threatening Hacker With 440 Years, Prosecutors Settle for a Misdemeanor appeared first on WIRED.
Plenty of companies brag that their communications app is encrypted. But that marketing claim demands a followup question: who has the key?
How the world's first real computer, the ENIAC, was restored by an unlikely group of conservationists—all thanks to Ross Perot.
The post How the World’s First Computer Was Rescued From the Scrap Heap appeared first on WIRED.
Piecing together new information from various researchers, it's clear the 'Regin" malware is one of the most sophisticated nation-state spy tools ever found.
The post Researchers Uncover Government Spy Tool Used to Hack Telecoms and Belgian Cryptographer appeared first on WIRED.
In 1989, the year the Berlin Wall began to fall, American artist Jim Sanborn was busy working on his Kryptos sculpture, a cryptographic puzzle wrapped in a riddle that he created for the CIA’s headquarters and that has been driving amateur and professional cryptographers mad ever since. To honor the 25th anniversary of the Wall’s […]
The post Finally, a New Clue to Solve the CIA’s Mysterious Kryptos Sculpture appeared first on WIRED.
More than two years after Julian Assange sought protection at the Ecuadorian embassy in the UK, a Swedish court is still demanding he return to that country to face questioning in a sex crimes investigation. Today a Swedish appeals court rejected Assange’s request to rescind the warrant for his arrest. “In making this assessment, account […]
The post Swedish Court Rejects Julian Assange’s Appeal to Dismiss His Arrest Warrant appeared first on WIRED.
The eBay-style contraband bazaar Evolution has grown more than 50 percent in drug offerings since September.
The post How the Dark Web’s New Favorite Drug Market Is Profiting From Silk Road 2’s Demise appeared first on WIRED.
Jelle Martens Eight years ago, Polish hacker Joanna Rutkowska was experimenting with rootkits—tough-to-detect spyware that infects the deepest level of a computer’s operating system—when she came up with a devious notion: What if, instead of putting spyware inside a victim’s computer, you put the victim’s computer inside the spyware? At the time, a technology known […]
The post How Splitting a Computer Into Multiple Realities Can Protect You From Hackers appeared first on WIRED.
With the rise and fall of the Silk Road—and then its rise again and fall again—the last couple of years have cast new light on the Dark Web. But when a news organization as reputable as 60 Minutes describes the Dark Web as “a vast, secret, cyber underworld” that accounts for “90% of the Internet,” it’s time for a refresher.