The Intercept’s focus on adverasial journalism and anonymous whistleblower security is paying off.
The Intercept’s focus on adverasial journalism and anonymous whistleblower security is paying off.
A clever attack by French researchers turns your headphone cable into an antenna to send surreptitious voice commands.
Companies are clamoring for coverage against losses due to hackers. But insurance firms are being selective: The risk involved isn’t well understood — and the crimes themselves are evolving rapidly.
The White House has denied the FBI’s pleas for an encryption backdoor. But don’t forget that feds can still sneak in through the window.
The post Cops Don’t Need a Crypto Backdoor to Get Into Your iPhone appeared first on WIRED.
Researchers have uncovered advanced malware that can steal virtually all of a large organization’s e-mail passwords by infecting its Outlook Web Application (OWA) mail server over an extended period of time.
Researchers from security firm Cybereason discovered the malicious OWA module after receiving a call from an unnamed company that had more than 19,000 endpoints. The customer had witnessed several behavioral abnormalities in its network and asked Cybereason to look for signs of an infection. Within a few hours, the security firm found a suspicious DLL file loaded into the company’s OWA server. While it contained the same name as a benign DLL file, this one was unsigned and was loaded from a different directory.
The OWAAUTH.dll file contained a backdoor. Because it ran on the server, it was able to retrieve all HTTPS-protected server requests after they had been decrypted. As a result, the attackers behind this advanced persistent threat—the term given to malware campaigns that target a specific organization for months or years—were able to steal the passwords of just about anyone accessing the server.
The anti-surveillance group Intelexit has graduated from passing out pamphlets to dropping them from the sky.
The post Activists’ Drone Drops Anti-Spying Leaflets Over the NSA appeared first on WIRED.
Counter-terrorism investigations are being “undermined” by social media companies which do not co-operate fully with police, the UK’s most senior counter-terrorism officer says.
Smartphone users can do “very little” to stop security services getting “total control” over their devices, US whistleblower Edward Snowden tells the BBC in his first British TV interview.
Eleven Pacific Rim nations and the US agreed Monday to the so-called Trans-Pacific Partnership pact—a secret trade accord backed by nations from Australia to Vietnam.
According to the Electronic Frontier Foundation, “The TPP contains a chapter on intellectual property covering copyright, trademarks, and patents. Since the draft text of the agreement has never been officially released to the public, we know from leaked documents, such as the May 2014 [PDF] draft of the TPP Intellectual Property Chapter [PDF], that US negotiators are pushing for the adoption of copyright measures far more restrictive than currently required by international treaties, including the controversial Anti-Counterfeiting Trade Agreement (ACTA) [PDF].”
Negotiating nations include the US, Japan, Australia, Peru, Malaysia, Vietnam, New Zealand, Chile, Singapore, Canada, Mexico, and Brunei Darussalam. Combined, the nations represent about 40 percent of the global economy. The secret accord took more than five years to produce and must be approved by the US Congress. In all, there are 30 chapters, and they won’t be made public for at least a month. Negotiating nations thought it would be better to bargain in secret than in public. There have been leaks, but the citizens of the countries negotiating the pact have deliberately been kept in the dark about it.
Researchers have shown how attackers using a drone plus a mobile phone could intercept documents sent to Wi-Fi printers.
The post Hacking Wireless Printers With Phones on Drones appeared first on WIRED.