crime
Most Guns Sold on the Dark Web Originate from the United States, Study Finds, Surprising No One  

Roughly three-fifths of the weapons sold on a selection of dark web marketplaces originate from the United States, according to a new study examining the scope of the internet’s black market arms trade. Read More >>

twitter
Nearly 90,000 Sex Bots Invaded Twitter in ‘One of the Largest Malicious Campaigns Ever Recorded on a Social Network’

Last week, Twitter’s security team purged nearly 90,000 fake accounts after outside researchers discovered a massive botnet peddling links to fake “dating” and “romance” services. The accounts had already generated more than 8.5 million posts aimed at driving users to a variety of subscription-based scam websites with promises of—you guessed it—hot internet sex. Read More >>

security
Hackers Created Fake News Sites in Attempt to Phish Reporters Covering China 

Researchers at Citizen Lab have unearthed a broad campaign aimed at infiltrating Chinese language news sites after discovering a phishing campaign targeting journalists at the US-based China Digital Times. Read More >>

watch this
New Video Shows Dramatic Raid of Software Firm Linked to NotPetya Attack

Video has emerged of a Ukrainian police raid Tuesday at M.E. Doc, the software firm whose servers have been linked to a series of devastating malware attacks around the world, including the NotPetya attack one week ago. Read More >>

security
Crime Group Behind ‘Petya’ Ransomware Resurfaces to Distance Itself From This Week’s Global Cyberattacks

Janus Cybercrime Solutions, the author of Petya—the ransomware initially attributed with Tuesday’s global cyberattacks—resurfaced on Twitter late Wednesday, seemingly offering to help those whose files can no longer be recovered. Read More >>

uncategorized
Leaked Manual Reveals How CIA Can Track Windows Users by Gauging Wi-Fi Signal 

On Wednesday, WikiLeaks released the latest issue in its ongoing Vault 7 series—a trove of secret or otherwise classified US Central Intelligence Agency files from 2013 to 2016 describing previously undisclosed malware and viruses. Read More >>

ransomware
Ransomware Victims Are Unable to Decrypt Files After Email Provider Controversially Shuts Down Attackers’ Inbox

Another major cyberattack attack is quickly spreading across Europe and has now infected systems in the US as well. Researchers at Symantec and other leading security firms are confirming that ransomware is being spread via EternalBlue, an exploit leaked in April by the ShadowBrokers hacking group, which is said to have been stolen from the US National Security Agency. Read More >>

windows
Windows 10 S Doesn’t Appear to Be as Invulnerable to Ransomware as Microsoft Claims

Microsoft’s tall claim that “no known ransomware” will run on its Windows 10 S operating system has been weighed, measured, and found wanting. Read More >>

hacking
South Korean Company Agrees to Pay Hackers $1 Million Bitcoin Ransom to Unlock Its Files

A South Korean web hosting company will reportedly shell out about a million dollars (~£793,900) to resolve a ransomware crisis at its data centre, the highest such payout publicly known to date. Read More >>

music
Leaked Data Reveals Just How Freaking Expensive It Is to Put Spice Girls and Coldplay Songs in Crappy Movies

One of Hollywood’s top contract management firms was sent scrambling this week after informed of a breach involving a wealth of confidential and proprietary data. Contained in the leak was invaluable information about the earnings of some of the world’s biggest musical talent during the era of Now That’s What I Call Music! 45 through 74. Read More >>

crime
Police Make First Arrest Using Facial Recognition Surveillance Vans

Science fiction authors have been writing about it for decades. Privacy activists have warned it’s just around the corner. Today, perfected facial recognition is one step closer to becoming a reality. Read More >>

security
Workplace App Scrambles to Rescue Users Who Foolishly Used Its Service to Store Passwords

Although storing passwords in plaintext anywhere online is fundamentally the opposite of security, routine data breaches at some of the world’s biggest companies haven’t dissuaded some users from engaging in this obviously terrible practice. Read More >>

hackers
Hackers Leak Cosmetic Surgery Patient Photos After Obscene Ransom Demands Denied

Not every hacker on the planet is a callous basement dweller. Many are actually using their skills to make the world a better place, securing our favorite websites and vital infrastructures — not to mention all those tiny internet devices with cameras and microphones we’ve idiotically placed throughout our homes where we eat, sleep, and do yoga in the nude. Read More >>

security
Top Defense Contractor Left Sensitive Pentagon Files On Amazon Server With No Password 

Sensitive files tied to a US military project were leaked by a multi-billion dollar firm once described as the world’s most profitable spy operation, Gizmodo has confirmed. Read More >>

leaks
How Sneaky Hackers Altered Stolen Emails to Attack Putin’s Critics

Cyber espionage operations and leaks of sensitive government data are a regular occurrence these days. In our eagerness to learn hidden truths it is also imperative that we ask ourselves whether we can trust the accuracy of information offered up by unknown actors whose intentions are obscured. Is this information real, or has it been tampered with to further some powerful entity’s shadowy agenda? Should our default position be to treat leaks with the strictest suspicion—perhaps even as the calculated product of digital disinformation—until proven otherwise? Read More >>