New this week
Ars Technica
Gone in 130 seconds: New Tesla hack gives thieves their own personal key
Ars Technica
4 min read · Jun 8th · You may want to think twice before giving the parking attendant your Tesla-issued NFC card.
Reader View · Shared by 35, including Yann “shalf@mastodon.social” Heurtaux 不停, Martin Steiger, Evan Kirstel the $B2B Techfluencer, Backchannel, tenty
SC Media
'A bad guy HaveIBeenPwned': Ransomware group discloses victim data after hotel breach
SC Media
2 min read · Jun 15th · The unique gambit by the ALPHV ransomware group is likely intended to force a ransom. One negotiator believes it might backfire.
Reader View · Shared by 14, including Marc R Gagné MAPP 🍁, Troy Hunt
Threatpost
Travel-related Cybercrime Takes Off as Industry Rebounds
Threatpost
2 min read · Jun 15th · Upsurge in the tourism industry after the COVID-19 pandemic grabs the attention of cybercriminals to scam the tourists.
Reader View · Shared by 8
Engadget
Former Amazon engineer convicted in 2019 Capital One data breach
Engadget
1 min read · Jun 18th · Paige Thompson was found guilty of wire fraud and unauthorized access to a protected computer..
Reader View · Shared by 9, including Marc R Gagné MAPP 🍁
DarkReading
How AI Is Useful — and Not Useful — for Cybersecurity
DarkReading
3 min read · Jun 10th · AI works best when security professionals and AI are complementing each other.
Shared by 55, including Marcus Borba @ #CollisionConf #SiemensAtCollision, AI, Thomas Pleil
Recently popular
The New Yorker
The Surreal Case of a C.I.A. Hacker’s Revenge
The New Yorker
10 min read · Jun 6th · A hot-headed coder is accused of exposing the agency’s hacking arsenal. Did he betray his country because he was pissed off at his colleagues?
Reader View · Shared by 279, including T. Greer, Mathew Ingram, hakan, Carrie Brown, Howard Getson, SwiftOnSecurity, Evan Kirstel the $B2B Techfluencer, Tactical Tech
WIRED
How a Saxophonist Tricked the KGB by Encrypting Secrets in Music
WIRED
2 min read · Jun 8th · Using a custom encryption scheme within music notation, Merryl Goldberg and three other US musicians slipped information to Soviet performers and activists known as the Phantom Orchestra.
Shared by 144, including Chris Isak , Backchannel, Jennifer Ouellette, Merkstatt
WIRED
The Hacker Gold Rush That's Poised to Eclipse Ransomware
WIRED
2 min read · Jun 5th · As governments crack down on ransomware, cybercriminals may soon shift to business email compromise—already the world's most profitable type of scam.
Shared by 118, including Marsha Collier, Backchannel
Visual Capitalist
Visualizing The 50 Biggest Data Breaches From 2004–2021
Visual Capitalist
10 min read · Jun 1st · View high-resolution version of infographic
Reader View · Shared by 104, including Evan Kirstel the $B2B Techfluencer, Thomas Pleil, Neira Jones, George J Huba PhD, Marc R Gagné MAPP 🍁, Nicolas Babin, Dr. Marcell Vollmer 🇺🇦 #StaySafe & Carpe Diem, Theodora (Theo) Lau - 劉䂀曼 🌻
MIT Technology Review
Chinese hackers exploited years-old software flaws to break into telecom giants
MIT Technology Review
4 min read · Jun 9th · A multi-year hacking campaign shows how dangerous old flaws can linger for years.
Reader View · Shared by 94, including Nicolas Babin, Evan Kirstel the $B2B Techfluencer, Howard Getson
DarkReading
How AI Is Useful — and Not Useful — for Cybersecurity
DarkReading
3 min read · Jun 10th · AI works best when security professionals and AI are complementing each other.
Shared by 55, including Marcus Borba @ #CollisionConf #SiemensAtCollision, AI, Thomas Pleil
DarkReading
Artificial Intelligence and Security: What You Should Know
DarkReading
3 min read · Jun 10th · Next-generation AI products learn proactively and identify changes in the networks, users, and databases using "data drift" to adapt to specific threats as they evolve.
Shared by 44, including AI, Iain Brown, PhD, Nicolas Babin
Ars Technica
Gone in 130 seconds: New Tesla hack gives thieves their own personal key
Ars Technica
4 min read · Jun 8th · You may want to think twice before giving the parking attendant your Tesla-issued NFC card.
Reader View · Shared by 35, including Yann “shalf@mastodon.social” Heurtaux 不停, Martin Steiger, Evan Kirstel the $B2B Techfluencer, Backchannel, tenty
WIRED
Apple Just Killed the Password—for Real This Time
WIRED
2 min read · Jun 7th · Apple’s iOS 16 and macOS Ventura will introduce passwordless login for apps and websites. It’s just the beginning.
Shared by 33, including Theodora (Theo) Lau - 劉䂀曼 🌻, Backchannel, Edney Souza 🧙♂️
hertzbleed.com
Hertzbleed Attack
hertzbleed.com
4 min read · Jun 14th · Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86
Reader View · Shared by 29, including Eric Bailey
All-time favorites
HackerNoon | Will NOT Insert LINKS in HN stories
I’m harvesting credit card numbers and passwords from your site. Here’s how.
HackerNoon | Will NOT Insert LINKS in HN stories
~12 min read · From 2018 · The following is a true story. Or maybe it’s just based on a true story. Perhaps it’s not true at all.
Reader View · Shared by 643, including Massimiliano Aroffo, Mara Averick, Rodrigo Franco (Caffo), David Smooke, Werner Vogels, Thomas Power, Chris Roth, 𝐦𝐫𝐯𝐧 , Diego Paladino, Zain Fathoni, Ha Duong, Dirk Spannaus, Aleyda Solis 🇺🇦, Helmi, Tris Hussey, Barnaby Skinner, Eric L. Barnes, Marcus Kuhn, Nils Hitze, Tarik ESSAADI
WIRED
‘I Forgot My PIN’: An Epic Tale of Losing $30,000 in Bitcoin
WIRED
20+ min read · From 2017 · Veteran tech journalist Mark Frauenfelder tries everything, including hypnosis, to recover a small fortune from a locked bitcoin device.
Summary · Shared by 532, including Harpreet Singh, FANZO 🧢 NFT 365, Brad Brooks, Thomas Power, Andreas Kubli, Helmi, jean marc manach, FactorDaily, Florian Jungnikl-Gossy ⛱, Howard Getson, Christopher Allen, k, Mike Davidson, Nando 💪🇦🇺🇦🇷, Ian Lurie 🇺🇦, Paulmears, L. Taylor Banks, Klaus Eck, Vinny Lingham, getAbstract
Cloudflare
Announcing 1.1.1.1: the fastest, privacy-first consumer DNS service
Cloudflare
9 min read · From 2018 · Cloudflare's mission is to help build a better Internet. We're excited today to take another step toward that mission with the launch of 1.1.1.1 — the Internet's fastest, privacy-first consumer DNS…
Reader View · Shared by 482, including Oriol Farré, Vinny Lingham, Sachin Rekhi, Nils Hitze, Mark Kaigwa, Mauricio Matias, Bjorn Larsen, Thomas Pleil, Andreas Von Gunten, Tibor Martini 🇺🇦, Shawn Venasse, adrianoesch, Preshit, Josh Clark, Esther Schindler, Helmi, Aleyda Solis 🇺🇦, Tris Hussey, Marcus Raitner, Ron McIntyre
Stratechery
Zero Trust Information
Stratechery
~12 min read · From 2020 · Zero Trust Networking is security with Internet assumptions; there is tremendous value if we apply the same approach to information.
Reader View · Shared by 481, including Scott Monty, Christian Surchi, Linus Basig, Andrew Ermogenous, Ben Thompson, LoriBeth, Steven Sinofsky, Keerthi G, 🌴Marc Averitt🌴, Jonathan Kogan, Max Niederhofer ❤️🔥 (maxniederhofer.eth), Brian Armstrong - barmstrong.eth, Mark Kaigwa, Merkstatt, Rifki Caesar Novaldin, 💥💥 Larson Reever🇺🇸, Konrad Weber, Balaji Srinivasan, Tom Connor, Mark Little
Fast Company
Forget the new iPhones: Apple’s best product is now privacy
Fast Company
6 min read · From 2018 · Under Tim Cook’s leadership, Apple saw just how critical an issue user privacy would become. Now it’s at least as important a feature as shiny industrial design or a nice camera.
Reader View · Shared by 428, including Lucas Foster, Diego Paladino, Stephan Leduc, Gerd Leonhard, Enrique Dans, fernand0, Azeem Azhar, Julian de Keijzer, Helmi, Reto Laemmler, Liv 😷, Ste Davies, Mark Kaigwa, Nicolas Berg, Janosch Troehler, Johannes Lenz, Massimiliano Aroffo, Andreas Heer, Ralph Hutter, Javi Cantón
Guardian Tech
Amazon boss Jeff Bezos's phone 'hacked by Saudi crown prince'
Guardian Tech
4 min read · From 2020 · Exclusive: investigation suggests Washington Post owner was targeted five months before murder of Jamal Khashoggi
Reader View · Shared by 409, including John Nosta, Grzegorz Wapiński, Dan Gillmor, Semil, Mathew Ingram, Steve Faktor, Brian D. Earp, Ph.D., massimo mantellini, Ste Davies, Mark Little, Christopher Lauer, Anna Irrera, Bjorn Larsen, 艾未未 Ai Weiwei, Azeem Azhar, Joanna J Bryson, Dean Anthony Gratton, Matthias Lampe, Armin Wolf, Katja Evertz
webkay.robinlinus.com
What every Browser knows about you
webkay.robinlinus.com
1 min read · From 2016 · See all the data your browser reveals about you by visting a website.
Shared by 393, including Patrick Scheuerer, ThomNagy, Fabricio Teixeira, Adrian Zumbrunnen, Oleg Baskov, Esther Schindler, Data Science Renee, Mara Averick, Herbert Bay, hernannadal, Mathias Böhm, Rand Fishkin, ᴄʟᴀᴜᴅɪᴏ sᴄʜᴡᴀʀᴢ, Mark Needham, Jitendra Vyas, Liv 😷, Lorenz König, christina r wodtke: the R is for radical focus, Thomas Power, Mark Kaigwa
The New York Times
Daniel Kaminsky, Internet Security Savior, Dies at 42
The New York Times
7 min read · 2021-04-27 · If you are reading this obituary online, you owe your digital safety to him.
Shared by 359, including Mar Hicks, Caterina Fake, Mathew Ingram, Richard Deitsch, massimo mantellini, John Schwartz, Anne Applebaum, timoreilly, Joshua Benton, Matthew Herper, Jennifer Ouellette, Stefan Plattner, hakan, Jason Stanley, Korben, SwiftOnSecurity, Ben Fry, Craig Brown, PhD, dj patil, Kara Swisher
Quartz
Your digital identity has three layers, and you can only protect one of them
Quartz
7 min read · From 2019 · What story does your data tell about you?
Reader View · Shared by 351, including ThomNagy, fernand0, Ines Bieler, Liliane Ferrari ™, Christopher Allen, Daniel Boos, Scott Williams, Michael Seemann, Javi Cantón, Jacob Cass, Marsha Collier, 𝐦𝐫𝐯𝐧 , von Moerenburgh, Dominik Grolimund, Matthias «Delay» Göbel, Fern, Lucas Foster, Klaus Eck, Lluís Codina, Sir Lord Travis Wright, Web3 Speaker + #NFTNYC