A Right-Wing Troll Appears To Have Tweeted About An FBI Investigation Into The Michigan Kidnapping Plot Before It Went Public
Adding to the confusion, one of the lead FBI agents in the case is listed as the owner of an “internet intelligence company” for which the troll claims to be CEO. No one is talking.
Impersonating the country's foreign ministry, hackers are trying to gain control of computers to carry out an unknown goal.
Video conferencing software provided by RingCentral and Zhumu is affected by a security flaw that could allow attackers easy access to laptop cameras and microphones.
The move comes after the DNC took a similar pledge. Republican groups so far have not taken that step.
BuzzFeed News previously revealed the Institute for Critical Infrastructure Technology was using fake accounts to promote its work. Now it's under scrutiny again.
If you're still alone on Valentine's Day, don't worry: at least a hacker has your name and email.
The Democratic National Committee, worried about appearing partial to a specific candidate, has not spoken directly with 2020 campaigns about cybersecurity.
Epic Games, the company behind the popular video game Fortnite, acknowledged the vulnerability and said it had been “addressed.”
The databases at Marriott, Facebook, and more were breached this year. Here’s how to secure your account and protect yourself from identity theft.
Telling a company you want out doesn’t necessarily mean it stops collecting, or even sharing, your data.
Top Republican Donors Aren’t Getting Any Information About The House Republican Campaign Arm Getting Hacked
“You would expect a little better customer service,” one NRCC donor said of the communication about the hack.
The US Loves To Charge Other Governments' Hackers With Crimes. What Happens When One Of Those Countries Returns The Favor?
As the US grows increasingly comfortable with "name-and-shame" tactics against hackers who work for China, Iran, North Korea, and Russia, it's only a matter of time before US government hackers are outed.
Yoshitaka Sakurada said he had “always directed my staff and secretaries to do that kind of thing.”
We're on the lookout for cyber-shenanigans tomorrow. But we're also vigilant for false claims — which in the right context can do even more damage.
Want to use your Spotify account without a Facebook log-in? Officially, you probably can’t — but there's a workaround.
Your Account On Facebook — And Websites That Use Facebook Login — Could Be Compromised. Here’s What We Know.
Facebook still has no idea who the attackers are.
The “high level of precision” of Grindr’s distance data is revealing the location of millions of its users.
Attribution of the attack to North Korea was viewed skeptically at the time. But the indictment this week of North Korea for the hack may lift that skepticism.
Only a customer’s IP address was required to gain complete access to their account. Spectrum fixed the flaws after a BuzzFeed News inquiry.
The company behind the app Turnbull used to message Kevin Rudd doesn't think his new encryption legislation will be enforceable on tech companies not based in Australia.
The Fox host brought a burner phone to Singapore, where he interviewed President Trump after the summit with North Korea.
The DC Cybersecurity Think Tank Caught Using Fake Twitter Accounts Has Lost Sponsors, And Its Shady Cofounder Is Gone
Following a BuzzFeed News investigation, Institute for Critical Infrastructure Technology cofounder James Scott has “voluntarily decided to step away” and a law firm will review claims about him.
A DC Think Tank Used Fake Social Media Accounts, A Bogus Expert, And Fancy Events To Reach The NSA, FBI, And White House
ICIT bills itself as "America's Cybersecurity Think Tank." But BuzzFeed News found it's running fake Twitter accounts and its top expert has questionable credentials.
We can do better than endless lines, low turnout, and outdated tech. And the fear of hackers shouldn't stop us.
How to take control of your personal information, if deleting Facebook, Messenger, WhatsApp, and Instagram isn’t realistic.
You may be unwittingly handing over lots of personal information to outside companies through Facebook. Here’s how to see what you’re giving up and how to change your settings.
The company said an additional 2.4 million people were affected by last year's data breach.
Without a PIN, hackers can hijack your mobile account, take control of your phone number, and use that number to gain access to your online accounts.
But GoGet was told by NSW Police to keep it under wraps until just now.
Tinder leaves some data unencrypted, which means a hacker on the same Wi-Fi network could track some of your activity on the app, according to the cybersecurity firm Checkmarx.
A recent threat from Russian government hackers led the Senate sergeant-at-arms to tell Senate offices that the security of their personal accounts and devices was their responsibility.
You don't even need to click the malicious link.
„Meltdown” und „Spectre” betreffen vermutlich Milliarden Geräte.
Midway between the 2016 and 2018 elections, the US still has major problems that make its voting systems insecure.
US intelligence keeps hinting at Kaspersky Lab's Russian ties. But some of the antivirus company's competitors in the US said it might be getting a raw deal.
Call not just one, but all three credit reporting agencies. Protect your PIN. "At this point it's the prudent course."
Phishing drills, top Silicon Valley hires, constant cybersecurity education, emails in the cloud, Tom Perez on Signal, and end-to-end encryption apps like Wickr, which the rest of the Democratic party committees have already adopted. The DNC’s new CTO, now concluding an internal security review, wants a “culture change inside the building.”
Cybersecurity Experts Say Prosecution Of The "NHS Hero" Hacker Could Damage Trust In US Law Enforcement
Marcus Hutchins, who found the "kill switch" to stop a massive ransomware attack that hit NHS computers, is facing charges in the US, and researchers warned that this could undermine crucial online security relationships.
Each of the officials cited their own reasons for leaving, but the lack of leadership is unusual and may make US government computers more vulnerable.
Your smart vacuum has been mapping your house since 2015, and it's considering selling that data to Google, Amazon, and Apple.
The latest software update patches a security vulnerability that would allow an attacker to hack your phone using the device's Wi-Fi chip.
A security lapse may have exposed the account PINs of approximately 6 million Verizon customers.
Manning, who announced she was transgender while in prison, leaked more than 700,000 military intelligence reports and documents to WikiLeaks in 2010 and later had her sentence commuted by then-president Barack Obama.
More than 150 countries across the world are being targeted in what cybersecurity experts say may be the biggest ransomware attack ever observed.
What "phishing" is, how to identify it, and what to do if hackers trick you.
Friday's global cyberattack hit hospitals across the UK, and early evidence suggests it could have been prevented by a free patch issued by Microsoft in March.
The order calls for broad reviews of the federal government’s online vulnerabilities and creates standards for cybersecurity practices across various government agencies.
Kaspersky has denied links to the Russian government, but US officials are raising doubts.
"This operation is obviously a democratic destabilization, like that which took place in the United States during the last presidential campaign," said Emmanuel Macron's campaign.
The chain "detected unauthorized activity" on its payment system.
Dieselben russischen Hacker, die auch versucht haben, die US-Wahlen zu beeinflussen, sind offenbar in Deutschland und Frankreich aktiv. Das zeigt ein neuer Bericht der Firma Trend Micro. Ein Ziel war demnach auch die Konrad-Adenauer-Stiftung.
Congress voted to allow your internet service providers to sell your online activity to advertisers – here’s the simplest way to prevent that from happening.
Email addresses, phone numbers and product codes were made available on publicly accessible pages.
The Justice Department indicted four men for hacking Yahoo, a breach that exposed the information of hundreds of millions of customers.
Businesses that store information tied to Russian citizens are required to hold that data on servers located in Russia but LinkedIn refused to comply, Russian regulators said.
It’s not just those scary pop-ups you need to worry about.
Palantir started working with Home Depot after its massive credit card hack in 2014, but the retailer recently decided the cyber services were no longer worth it.
The annual RSA conference was a place for the Obama White House to show its commitment to cybersecurity and have the government meet with the industry.
The arrest of several of Russia’s top cybersecurity figures has led to speculation that there’s a shake-up inside the country’s national security service related to hacks surrounding the US election.
Easy tips to shield yourself from expanded government surveillance.
With no known special security protections, @realDonaldTrump could be exploited for financial gain, to cause geopolitical instability, or worse.
The hacker allegedly behind the breach, who may have swept up the personal information of thousands of Americans who have applied for Russian visas, claims he will not publicly disclose the information.
"I think there's a lot of fear, given Trump's alarming statements about surveillance and his penchant for revenge, that he will attempt to use surveillance to crush dissent."
"Mobile security is one of the most urgent, and challenging questions facing the security of senior members of government."
There may have been some small outages in the west African country, but the entire country did not get taken down by the same attack that crippled US websites.
“At the end of the day, we don’t know what happened."
A potential revision to the country's cybersecurity law that would make it easier to send people to jail for speaking out against the government has activists concerned.
For the first time in history, Washington has accused a foreign government of trying to interfere with the US election. Sheera Frenkel investigates the Russian hacking group at the forefront of that claim — and finds they’ve been practicing for this moment for a long time.
The internet giant built a custom program for US intelligence to spy on hundreds of millions of users. No one was happy to hear that.
After top lawmakers accused Russia of meddling with the election, US officials insisted votes on Election Day will be secure.
As more companies invite hackers to crack their code for bounties, the list of invitees is getting a little more selective.
The Clinton campaign and the DNC have been tight-lipped on what preparations they’re making, if any, to respond to the anticipated release of new material from WikiLeaks.
This doesn't make any census...
What's going on behind #CensusFail?
“I hope whoever comes from the Clinton campaign turns off their wi-fi and Bluetooth on their phones,” one young cybersecurity professional in Las Vegas for the Black Hat conference said.
A senior Democratic National Committee official ridiculed a BuzzFeed News story about its cybersecurity as the "dumbest thing [he had] ever read."
"This issue is too important to be left to the courts."
Palantir hired a cybersecurity firm last year to test its digital defenses. A confidential report shows how the pro hackers were able to dominate the tech company's network.
They talk on Telegram and send viruses to their enemies. BuzzFeed News’ Sheera Frenkel looks at how ISIS members and sympathizers around the world use the internet to grow their global network.
Both the Democratic and Republican National Committees have handed out hundreds of thumb drives to reporters ahead of their national conventions, in a move cybersecurity experts call “borderline stupidity.”
Will the government follow through with its own review process and disclose the hack it used to access the iPhone of the San Bernardino shooter?
In an interview with Time, Apple CEO Tim Cook talked about the company's stance in a high-stakes battle against the FBI and the Department of Justice over an encrypted iPhone.
To combat human trafficking, a California lawmaker wants to weaken encryption tools on mobile phones.
The White House has abandoned efforts to pass a law limiting the use of end-to-end encryption, but U.S. officials continue to call for Silicon Valley to work with law enforcement to fight terrorism.
Sen. Wyden: “This ‘cybersecurity’ bill was a bad bill when it passed the Senate and it is an even worse bill today.”
For more than a year, a Dutch jihadi has been using Tumblr to post updates and answer questions about fighting in the Middle East as a radical Islamist.
The UK chancellor said the UK would "retaliate" against cyberattacks in a speech at GCHQ, in the latest of a series of UK security measures announced after the Paris attacks.
The United States made 65% of the world’s total data requests to Facebook — more than any other nation.
A powerful committee in Congress is looking for answers on phone surveillance, asking 24 federal agencies how they use Stingrays, and at what cost.
By staffing up and installing emerging technology, the federal chief information officer hopes to improve government cybersecurity.
Lawmakers move to defend against malicious hackers by encouraging companies to share information about cybersecurity threats.
Sen. Ron Wyden and a growing faction of tech companies are opposing a controversial cybersecurity bill.
The consumer watchdog's power to police unfair and deceptive practices extends to data privacy.
It would be a further tightening of China's already strict control over the internet.
The figure is far larger than the Office of Personnel Management previously reported. The agency's director told reporters Thursday that despite calls for her to resign, she remained "committed" to her work.
“If there is anyone to blame it is the perpetrators.”
A letter signed by Google, Apple, Facebook, and others asks President Barack Obama to reject legislative proposals that would grant law enforcement agencies "backdoor access" to encrypted personal information.
New types of attacks led by groups based out of China have been highlighted in reports by Kaspersky and FireEye.
The White House throws its support behind legislation that would increase sharing of cyberthreat information between the private sector and government. Both bills are expected to pass this week.