Security News

Technical Report of the Bezos Phone Hack
2020-01-24 14:34

Motherboard obtained and published the technical report on the hack of Jeff Bezos's phone, which is being attributed to Saudi Arabia, specifically to Crown Prince Mohammed bin Salman. "[W]ithin hours of the encrypted downloader being received, a massive and unauthorized exfiltration of data from Bezos' phone began, continuing and escalating for months thereafter," the report states.

The Bezos Phone Hack: Narrative Framed by Loose Facts
2020-01-24 14:33

A forensic investigation commissioned by Bezos concludes claims to have uncovered the May 2018 hack attack. Bin Salman sent Bezos a large video file on May 1, 2018, which FTI describes as "Arriving unexpectedly and without explanation," as if people routinely warn their friends that they're about to send a video attachment.

What We Know, And Don’t, About the Alleged Bezos Phone Hack
2020-01-23 17:15

U.N. human rights experts are asking Washington to investigate a suspected Saudi hack that may have siphoned data from the personal smartphone of Jeff Bezos, Amazon founder and owner of The Washington Post. Bezos went public with the suspected hack shortly thereafter, saying the National Enquirer tabloid had threatened to publish his private messages and photos.

Documents Describe US Cyber Command's Campaign to Hack ISIS
2020-01-22 19:18

The U.S. Cyber Command's campaign to hack ISIS and disrupt its media operations faced some challenges, including a lack of data storage, but ultimately proved successful, according to government documents from 2016 that were made public Tuesday. The heavily-redacted documents published by the National Security Archive, a not-for-profit research organization, show that U.S. Cyber Command was not prepared to handle the amount of information it collected when it hacked ISIS. The command, which is part of the U.S. Defense Department and includes units from all military branches, also faced problems with interagency coordination and the lengthy process of vetting ISIS cyber targets.

Saudi Dismisses Link to Hack of Amazon Owner Bezos
2020-01-22 10:18

The Saudi embassy in Washington on Tuesday dismissed suggestions the kingdom hacked the phone of Washington Post owner Jeff Bezos, as media reports linked the security breach to a WhatsApp message from an account of Crown Prince Mohammed bin Salman. The 2018 intrusion into the device led to the release of intimate images of Amazon founder Bezos, whose Post newspaper employed as a contributing columnist Jamal Khashoggi, a Saudi journalist murdered later that same year at Riyadh's consulate in Istanbul.

Pwn2Own 2020: Researchers Again Invited to Hack Tesla
2020-01-10 13:06

Trend Micro's Zero Day Initiative on Thursday announced the targets and prizes for the 2020 Pwn2Own competition, which is set to take place on March 18-20 in Vancouver at the CanSecWest conference. Pwn2Own 2019 introduced the automotive category and participants were invited to hack a Tesla Model 3.

Researchers Demonstrate How to Hack Any TikTok Account by Sending SMS
2020-01-08 02:02

TikTok, the 3rd most downloaded app in 2019, is under intense scrutiny over users' privacy, censoring politically controversial content and on national-security grounds-but it's not over yet, as the security of billions of TikTok users would be now under question. The famous Chinese viral video-sharing app contained potentially dangerous vulnerabilities that could have allowed remote attackers to hijack any user account just by knowing the mobile number of targeted victims.

Hardware hacks: The next generation of cybercrime
2019-12-19 06:30

Every 39 seconds there is a cyber attack affecting one out of three Americans. All organizations need to take proactive measures and think like the attackers that are infiltrating their networks....

Ring Plagued by Security Issues, Flood of Hacks
2019-12-18 19:20

A Motherboard report found Ring lacking basic security measures for preventing hackers from hijacking the devices.

Alexa, Google Home Eavesdropping Hack Not Yet Fixed
2019-12-17 14:00

Researchers say that Amazon and Google need to focus on weeding out malicious skills from the getgo, rather than after they are already live.