Why So Many People Make Their Password 'Dragon'

Why So Many People Make Their Password 'Dragon'

The mythical creature’s popularity says a lot about the psychology of password creation. Source: Wired Security Why So Many People Make Their Password ‘Dragon’

Learn more
Xbox Hacking, LinkedIn Bugs, and More Security News This Week

Xbox Hacking, LinkedIn Bugs, and More Security News This Week

Xbox hacking, LinkedIn bugs, and more security news this week. Source: Wired Security Xbox Hacking, LinkedIn Bugs, and More Security News This Week

Learn more
AWS Support – The First Decade

AWS Support – The First Decade

We launched AWS Support a full decade ago, with Gold and Silver plans focused on Amazon EC2, Amazon S3, and Amazon SQS. Starting from that initial offering, backed by a small team in Seattle, AWS Support now encompasses thousands of people working from more than 60 locations. A Quick Look Back Over the years, that… Read more »

Learn more
DNC Lawsuit Against Russia Reveals New Details About Devastating 2016 Hack

DNC Lawsuit Against Russia Reveals New Details About Devastating 2016 Hack

In suing Russia, the Trump campaign, and others over the hack of its systems in 2016, the Democratic National Committee has also filled in important timeline details. Source: Wired Security DNC Lawsuit Against Russia Reveals New Details About Devastating 2016 Hack

Learn more
Why Police Should Monitor Social Media to Prevent Crime

Why Police Should Monitor Social Media to Prevent Crime

Opinion: Citizens may object to their social media posts being mined by law enforcement, but the practice can keep the public safe. Source: Wired Security Why Police Should Monitor Social Media to Prevent Crime

Learn more
The 'Do Not Disturb' App Protects Your Mac From 'Evil Maid' Attacks

The 'Do Not Disturb' App Protects Your Mac From 'Evil Maid' Attacks

Detecting an insidious physical attack on your MacBook may often be as simple as alerting you when its lid opens. Source: Wired Security The ‘Do Not Disturb’ App Protects Your Mac From ‘Evil Maid’ Attacks

Learn more
The Security Risks of Login With Facebook

The Security Risks of Login With Facebook

New research from Princeton University exposes vulnerabilities in the social network’s universal login API. Source: Wired Security The Security Risks of Login With Facebook

Learn more
Get Started with Blockchain Using the new AWS Blockchain Templates

Get Started with Blockchain Using the new AWS Blockchain Templates

Many of today’s discussions around blockchain technology remind me of the classic Shimmer Floor Wax skit. According to Dan Aykroyd, Shimmer is a dessert topping. Gilda Radner claims that it is a floor wax, and Chevy Chase settles the debate and reveals that it actually is both! Some of the people that I talk to… Read more »

Learn more
How DNA Transfer Nearly Convicted an Innocent Man of Murder

How DNA Transfer Nearly Convicted an Innocent Man of Murder

We leave traces of our genetic material everywhere, even on things we’ve never touched. That got Lukis Anderson charged with a brutal crime he didn’t commit. Source: Wired Security How DNA Transfer Nearly Convicted an Innocent Man of Murder

Learn more
New – Registry of Open Data on AWS (RODA)

New – Registry of Open Data on AWS (RODA)

Almost a decade ago, my colleague Deepak Singh introduced the AWS Public Datasets in his post Paging Researchers, Analysts, and Developers. I’m happy to report that Deepak is still an important part of the AWS team and that the Public Datasets program is still going strong! Today we are announcing a new take on open… Read more »

Learn more
The OURSA Security Conference Calls Out Lack of Inclusion

The OURSA Security Conference Calls Out Lack of Inclusion

The OURSA security conference offered a place for diverse voices in security, a counterpoint to the corporate hegemony of RSA. Source: Wired Security The OURSA Security Conference Calls Out Lack of Inclusion

Learn more
'Trustjacking' Could Expose iPhones to Attack

'Trustjacking' Could Expose iPhones to Attack

Think twice before you tell your iPhone to trust that laptop when you charge it. Source: Wired Security ‘Trustjacking’ Could Expose iPhones to Attack

Learn more
Inside the Unnerving CCleaner Supply Chain Attack

Inside the Unnerving CCleaner Supply Chain Attack

CCleaner owner Avast is sharing more details on the malware attackers used to infect legitimate software updates with malware. Source: Wired Security Inside the Unnerving CCleaner Supply Chain Attack

Learn more
Ultrasonic Signals Are the Wild West of Wireless Tech

Ultrasonic Signals Are the Wild West of Wireless Tech

Inaudible signals that your phone can hear—but you can’t—are often based on ad hoc tech, which makes for risky security. Source: Wired Security Ultrasonic Signals Are the Wild West of Wireless Tech

Learn more
Pornhub Will Now Accept Verge Cryptocurrency

Pornhub Will Now Accept Verge Cryptocurrency

By accepting Verge, Pornhub could help make cryptocurrency transactions in general more mainstream. Source: Wired Security Pornhub Will Now Accept Verge Cryptocurrency

Learn more
The Teens Who Hacked Microsoft's Videogame Empire—And Went Too Far

The Teens Who Hacked Microsoft's Videogame Empire—And Went Too Far

Among those involved in David Pokora’s so-called Xbox Underground, one would become an informant, one would become a fugitive, and one would end up dead. Source: Wired Security The Teens Who Hacked Microsoft’s Videogame Empire—And Went Too Far

Learn more
The White House Warns on Russian Router Hacking, But Muddles the Message

The White House Warns on Russian Router Hacking, But Muddles the Message

By scolding Russia for what looks like typical espionage, the US and UK are blurring red lines in cybersecurity. Source: Wired Security The White House Warns on Russian Router Hacking, But Muddles the Message

Learn more
The White House Loses Rob Joyce and Tom Bossert, Its Cybersecurity Brain Trust

The White House Loses Rob Joyce and Tom Bossert, Its Cybersecurity Brain Trust

White House cybersecurity coordinator Rob Joyce will follow homeland security advisor Tom Bossert out the door, leaving the Trump administration adrift on cybersecurity policy. Source: Wired Security The White House Loses Rob Joyce and Tom Bossert, Its Cybersecurity Brain Trust

Learn more
An Elaborate Hack Shows How Much Damage IoT Bugs Can Do

An Elaborate Hack Shows How Much Damage IoT Bugs Can Do

Rube-Goldbergesque IoT hacks are surprisingly simple to pull off—and can do a ton of damage. Source: Wired Security An Elaborate Hack Shows How Much Damage IoT Bugs Can Do

Learn more
How Russian Facebook Ads Divided and Targeted US Voters Before the 2016 Election

How Russian Facebook Ads Divided and Targeted US Voters Before the 2016 Election

New research shows just how prevalent political advertising was from suspicious groups in 2016—including Russian trolls. Source: Wired Security How Russian Facebook Ads Divided and Targeted US Voters Before the 2016 Election

Learn more