Tag: hacks

The Hacking Lawsuit Looming Over Truth Social
Technology

The Hacking Lawsuit Looming Over Truth Social

Then, according to the Florida suit, Swider used Orlando’s stolen Mailchimp account credentials and listserv to send an email to ARC II investors in the Truth Social deal on March 5, attacking Orlando’s management of ARC II and DWAC, and his involvement in a separate lawsuit filed against DWAC the previous month.“Mr. Orlando’s leadership has guided our common interests with DWAC directly into the arms of the SEC, the DOJ, lengthy delays and costly investigations,” Swider wrote. “By filing this lawsuit against DWAC, Mr. Orlando is destroying the value that may be realized upon consummation of the business combination by the Company and its members.”Swider then invited fellow investors to join him on a series of Zoom calls to “understand our risk exposure based on leadership that continues ...
A New Trick Uses AI to Jailbreak AI Models—Including GPT-4
Technology

A New Trick Uses AI to Jailbreak AI Models—Including GPT-4

Large language models recently emerged as a powerful and transformative new kind of technology. Their potential became headline news as ordinary people were dazzled by the capabilities of OpenAI’s ChatGPT, released just a year ago.In the months that followed the release of ChatGPT, discovering new jailbreaking methods became a popular pastime for mischievous users, as well as those interested in the security and reliability of AI systems. But scores of startups are now building prototypes and fully fledged products on top of large language model APIs. OpenAI said at its first-ever developer conference in November that over 2 million developers are now using its APIs.These models simply predict the text that should follow a given input, but they are trained on vast quantities of text, from...
This Cheap Hacking Device Can Crash Your iPhone With Pop-Ups
Technology

This Cheap Hacking Device Can Crash Your iPhone With Pop-Ups

As the Israel-Hamas war continues, with Israeli troops moving into the Gaza Strip and encircling Gaza City, one piece of technology is having an outsized impact on how we see and understand the war. Messaging app Telegram, which has a history of lax moderation, has been used by Hamas to share gruesome images and videos. The information has then spread to other social networks and millions more eyeballs. Sources tell WIRED that Telegram has been weaponized to spread horrific propaganda.Microsoft has had a hard few months when it comes to the company’s own security, with Chinese-backed hackers stealing its cryptographic signing key, continued issues with Microsoft Exchange Servers, and its customers being impacted by failings. The company has now unveiled a plan to deal with the ever-growin...
The Comedy of Errors That Let China-Backed Hackers Steal Microsoft’s Signing Key
Technology

The Comedy of Errors That Let China-Backed Hackers Steal Microsoft’s Signing Key

Microsoft said in June that a China-backed hacking group had stolen a cryptographic key from the company's systems. This key allowed the attackers to access cloud-based Outlook email systems for 25 organizations, including multiple US government agencies. At the time of the disclosure, however, Microsoft did not explain how the hackers were able to compromise such a sensitive and highly guarded key, or how they were able to use the key to move between consumer- and enterprise-tier systems. But a new postmortem published by the company on Wednesday explains a chain of slipups and oversights that allowed the improbable attack.Such cryptographic keys are significant in cloud infrastructure because they are used to generate authentication “tokens” that prove a user’s identity for accessing da...
Teens Hacked Boston Subway’s CharlieCard to Get Infinite Free Rides—and This Time Nobody Got Sued
Technology

Teens Hacked Boston Subway’s CharlieCard to Get Infinite Free Rides—and This Time Nobody Got Sued

In working with Rauch, the MBTA had created a vulnerability disclosure program to cooperate with friendly hackers who agreed to share cybersecurity vulnerabilities they found. The teens say they were invited to a meeting at the MBTA that included no fewer than 12 of the agency’s executives, all of whom seemed grateful for their willingness to share their findings. The MBTA officials asked the high schoolers to not reveal their findings for 90 days and to hold details of their checksum hacking techniques in confidence, but otherwise agreed that they wouldn’t interfere with any presentation of their results. The four teens say they found the MBTA’s chief information security officer, Scott Margolis, especially easy to work with. “Fantastic guy,” say Bertocchi.The teens say that as with Rauc...