The Dark Web Gets Darker With Rise of the 'Evolution' Drug Market
• Wired.comIn the digital drug trade as in the physical one, taking out one kingpin only makes room for another ready to satisfy the market's endless demand.
ON AIR NOW
Click to Play
In the digital drug trade as in the physical one, taking out one kingpin only makes room for another ready to satisfy the market's endless demand.
Roger Ver is so well known for his role in the rise of the world's most popular digital currency that some people call him "The Bitcoin Jesus."
"It has become a routine practice for the Navy to conduct surveillance of all the civilian computers in an entire state…"
Plain-text passwords and account names linked to five million Gmail accounts have been leaked onto several Russian forums. Security experts had already confirmed the data seemed legit, albeit approximately three years old, before Google put up its
A user of a Russian cryptocurrency forum has published a list of nearly 5 million email accounts and their passwords.
To hear the FBI tell it, tracking down the secret server behind the billion-dollar drug market known as the Silk Road was as easy as knocking on a door.
The early August cyberattack against USIS' computer network compromised the files of 25,000 Homeland Security Department workers and is under investigation by the FBI in what it described as a "state-sponsored attack."
Someone has taken over the email account belonging to bitcoin's secretive creator, Satoshi Nakamoto, saying he will sell Nakamoto's secrets for money.
When Weev Auernheimer exploited a mistake in the configuration of AT&T's access for iPads, the government prosecuted him. When the government wanted to nail Silk Road's Dread Pirate Roberts, the shoe was on the other foot.
To hear the FBI tell it, tracking down the secret server behind the billion-dollar drug market known as the Silk Road was as easy as knocking on a door.
Someone has taken over the email account belonging to bitcoin's secretive creator, Satoshi Nakamoto, saying he will sell Nakamoto's secrets for money.
As nude celebrity photos spilled onto the web over the weekend, blame for the scandal has rotated from the scumbag hackers who stole the images to a researcher who released a tool used to crack victims' iCloud passwords to Apple, whose security flaws
A hacker broke into part of the HealthCare.gov insurance enrollment website in July and uploaded malicious software, according to federal officials.
Every smart phone has a secondary OS, which can be hijacked by high-tech hackers
We don't need to rake over the gory details here, but in the last 12 hours, the internet has lost its "you know what" over some leaked celebrity photos.
Before companies like Microsoft and Apple release new software, the code is reviewed and tested to ensure it works as planned and to find any bugs.
Jennifer Lawrence, Kate Upton, Ariana Grande Among Celebrities Exposed in Massive Nude Photo Leak.
Tip of the hat to Ernest Hancock, and the DP's Joη for this great article.
Every smart phone has a secondary OS, which can be hijacked by high-tech hackers
Cell phones just got a whole lot more secure.
The FBI has launched an investigation into a series of attacks on the personal computers and online accounts of officers on the Ferguson, Missouri police department, CNN reports.
White hat hacker Ben Caudill is halfway through his sandwich when he casually reaches over to his iPhone, swipes the screen a few times, then holds it up to me. "Is that you?" he asks.
Private.me says it encrypts, dices and geographically segregates data.
During one of the most anticipated Black Hat presentations, IOActive's Ruben Santamarta demonstrated the numerous flaws he discovered in satellite communication systems
Big app-makers are grabbing all the personal data they can these days.
This weird New York Times story that a Russian criminal gang has stolen over 1.2 billion passwords. Yesterday, Forbes wrote that Hold Security is charging people $120 to tell them if they're in the stolen-password database:
Officials with the Tor privacy service have uncovered an attack that may have revealed identifying information or other clues of people operating or accessing anonymous websites and other services over a five-month span beginning in February.
When 17-year-old George Hotz became the world's first hacker to crack AT&T's lock on the iPhone in 2007, the companies officially ignored him while scrambling to fix the bugs his work exposed.
"Security Princess" is the actual title Google's Parisa Tabriz has on her business cards.
Chris Domas is a cybersecurity researcher, operating on what's become a new front of war, "cyber."