How Chinese Hackers Graduated From Clumsy Corporate Thieves to Military Weapons
Massive ‘Typhoon’ cyberattacks on U.S. infrastructure and telecoms sought to lay the groundwork for potential conflict with Beijing, as intruders gathered data and got in position to impede response and sow chaos.
How Suicide Drones Transformed the Front Lines in Ukraine
Outnumbered and desperate, the nation began hacking cheap consumer drones with explosives — bringing a brutal new form of violence to 21st-century warfare.
Ukraine Advances Killer Robot Drones With More Automation, Efficiency
Ukraine’s military-tech companies hone deadly drones, adding automation and efficiency to take on more functions from human pilots—but humans remain in control.
US Agency Warns Employees About Phone Use Amid Ongoing China Hack - Slashdot
A federal agency has issued a directive to employees to reduce the use of their phones for work matters due to China's recent hack of U.S. telecommunications infrastructure, WSJ reported on Thursday, citing people familiar with the matter. From the report: In an email to staff sent Thursday, the chi...
Millions of U.S. Cellphones Could Be Vulnerable to Chinese Government Surveillance - Slashdot
Millions of U.S. cellphone users could be vulnerable to Chinese government surveillance, warns a Washington Post columnist, "on the networks of at least three major U.S. carriers." They cite six current or former senior U.S. officials, all of whom were briefed about the attack by the U.S. intellige...
What the Exploding Pager Attack Means for Air Travel
Booby-trapped pagers raise questions about whether everyday electronics could present security hurdles for air travelers. For now, travelers can expect business as usual.
Rise of the Dragons: Fire-Breathing Drones Duel in Ukraine
Drones are getting another new twist: Soldiers attach canisters to them to create weapons capable of spitting out molten metal that burns at 4,400 degrees.
U.S. Indicts 2 Linked to Oct. 7 Cyberattack on Israeli Warning System
The Justice Department has accused two Sudanese brothers of cyberattacks on U.S. infrastructure as well as preventing possibly lifesaving alerts from reaching Israelis as the Hamas attack unfolded.
Exclusive | U.S. Wiretap Systems Targeted in China-Linked Hack - WSJ
AT&T and Verizon are among the broadband providers breached in the “Salt Typhoon” hack, potentially accessing information from systems the federal government uses for court-authorized network wiretapping requests.
How Sonos Botched an App and Infuriated Its Customers - Bloomberg
Ignoring “tech debt,” disregarding employee warnings and cutting costs combined to create a crisis that the high-end audio company is still struggling to recover from.
Security Controls for Computer Systems, commonly called the Ware report,[1][2] is a 1970 text by Willis Ware that was foundational in the field of computer security.[3]
"How Certification Systems Fail: Lessons from the Ware Report"
For the third time in a month, software glitch crashes SEPTA’s payment system
For the third time in a month, a software glitch has prevented SEPTA from collecting new fares from riders. During the morning rush, SEPTA riders were unable to add money to their Travel Wallets, buy new passes, or pay a Regional Rail conductor.