Uber's hacker, who claims to be 18 years old, says he hacked Uber for fun, using social engineering, might leak source code, and has access to its AWS account
Washington Post :
Uber says there is “no evidence” the hacker accessed sensitive user info, like trip histories, during the breach and that all its products are now “operational”
Uber says there is “no evidence” that any of its users' private information was compromised in a breach of its internal computer systems.
Uber hacker, who claims to be 18 years old, says he hacked Uber for fun, using social engineering, might leak source code, and has access to Uber's AWS account
The company said in a tweet it was “responding to a cybersecurity incident” — SAN FRANCISCO — Uber's computer systems …
Uber takes some internal systems offline to investigate a network breach; Yuga Labs' Sam Curry says it appears the hacker pretty much has “full access to Uber”
The company said on Thursday that it was looking into the scope of the apparent hack.
Mudge details Twitter's lack of logging, ignoring hackers' ongoing efforts to access its systems, how the FTC let the company “grade its own homework”, and more
A ticking bomb of security vulnerabilities. Covering up security failures. Duping regulators and misleading lawmakers.
A look at the efforts by at least six research groups to find dirt on Twitter whistleblower Peiter Zatko, including offers to pay his former colleagues for info
Twitter terminated its head of security Peiter “Mudge” Zatko this week, and CISO Rinki Sethi will depart in the coming weeks; both execs joined Twitter in 2020
Market summary: 📊 — Brutal week in the market finally ends. Steve Zurier / scmagazine.com : What's it mean? Making sense of Twitter's decision to oust ‘Mudge’ Zatko and Rinki Set...
Microsoft says it mitigated a 2.4Tbps DDoS attack on an Azure customer at the end of August, breaking AWS' record of mitigating a 2.3Tbps attack in Feb. 2020
Microsoft said its Azure cloud service mitigated a 2.4 terabytes per second (Tbps) distributed denial of service attack this year … Source: Azure Cloud Computing Services .
Sources: Apple is planning to manufacture a car by 2024 which may include self-driving tech, internally developed lidar sensors, and “breakthrough” battery tech
Sources: Apple is planning to manufacture a car by 2024 which may include self-driving tech, internally developed lidar sensors, and “breakthrough” battery tech
(Reuters) - Apple Inc is moving forward with self-driving car technology and is targeting 2024 to produce …
Cloudflare and Apple say they have developed a new protocol called Oblivious DNS-over-HTTPS, which decouples DNS queries from internet users for more privacy
Zack Whittaker / TechCrunch :
Zoom CEO says the app's upcoming end-to-end encryption feature will be available only to paid users in order to comply with law enforcement in case of misuse
If you're a free Zoom user, and waiting for the company to roll out end-to-end encryption for better protection of your calls, you're out of luck.
An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12
In the earlier posts we examined … Ian Beer / Project Zero : In-the-wild iOS Exploit Chain 1 Patrick Howell O'Neill / MIT Technology Review : Websites have been quietly hacking iPh...
Sources: a number of recently disclosed malicious websites used to hack into iPhones over a two-year period were designed to target Uyghur Muslims in China
A number of malicious websites used to hack into iPhones over a two-year period were targeting Uyghur Muslims, TechCrunch has learned.
For two years, a handful of websites hacked thousands of iPhones that visited them, getting access to live location data, photos, contacts, and even passwords
For two years, a handful of websites have indiscriminately hacked thousands of iPhones. — Hacking the iPhone has long …
An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12
In the earlier posts we examined … Ryan Whitwam / ExtremeTech : Google Discovered Malicious Websites Used to Hack iPhones for Years Jon Porter / The Verge : Google reveals major iP...
An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12
Project Zero's mission is to make 0-day hard. We often work with other companies to find and report security vulnerabilities …