How Hackers Turn Microsoft Excel’s Own Features Against It

You probably think of Microsoft’s classic spreadsheet program Excel as mostly boring. Sure, it can wrangle data, but it’s not exactly Apex Legends. For hackers, though, it’s a lot of fun. Like the rest of the Office 365 suite, attackers often manipulate Excel to launch their digital strikes. And two recent findings demonstrate how the program’s own legitimate features can be used against it. On Thursday, researchers from the threat…

June 27, 2019
Read More >>

Hackers Are Poking at a MacOS Gatekeeper Flaw Apple Left Unfixed

On February 22, cybersecurity researcher Filippo Cavallarin told Apple that he had found a bug in macOS. Left unchecked, the vulnerability could let malware slip past the operating system’s Gatekeeper security feature ndetected. According to Cavallarin, Apple said it would fix the problem by mid-May. When the company still hadn’t done so by the time a standard 90-day disclosure deadline had passed, Cavallarin went public, publishing a full description and…

June 27, 2019
Read More >>

I Scraped Millions of Venmo Payments. Your Data Is at Risk

Like many people, I use Venmo to pay for stuff: to split the check at dinner, to send my roommate my portion of the utility bills each month, to reimburse friends for concert tickets. It’s a useful app for sending and receiving money, regardless of who you bank with. WIRED OPINION ABOUT Dan Salmon is a masters graduate from Minnesota State University who specializes in information security. Last summer, after…

June 26, 2019
Read More >>

A Likely Chinese Hacker Crew Targeted 10 Phone Carriers to Steal Metadata

For anyone who’s worried that their phone might be hacked to track their location, who they call and when, and other metadata that describes the intimate details of their life, one cyberespionage group has provided a reminder that hackers don’t necessarily even need to reach out to your device to gain that access. It may be far easier and more efficient for sophisticated stalkers to penetrate a mobile provider, and…

June 25, 2019
Read More >>

He Cyberstalked Teen Girls for Years—Then They Fought Back

For years, Belmont, New Hampshire, had only one detective: Raechel Moulton. An old mill town of 7,200 people, Belmont is surrounded by lakes and forests but isn’t itself much of a draw for the tourists who flock to the region every summer. A hardware store and salon are about all Main Street has to offer; the biggest employer in town is a Shaw’s supermarket. At the police department, where Moulton…

June 24, 2019
Read More >>

The Internet Has Made Dupes—and Cynics—of Us All

Online fakery runs wide and deep, but you don’t need me to tell you that. New species of digital fraud and deception come to light almost every week, if not every day: Russian bots that pretend to be American humans. American bots that pretend to be human trolls. Even humans that pretend to be bots. Yep, some “intelligent assistants,” promoted as advanced conversational AIs, have turned out to be little…

June 24, 2019
Read More >>

Hackers Used Two Firefox Zero Days to Hit a Crypto Exchange

The week began with a tricky Google Calendar phishing scam, and ended with Iran ramping up its cyberattacks against the US, as talk of war with that nation mounts. That, as they say, escalated quickly. Before things took a turn for the geopolitical, we walked you through a dead simple way to stop data breaches with… database encryption. We explained why Google is getting retro when it comes to ways…

June 22, 2019
Read More >>

Cop Gets $585K After Colleagues Snooped on Her DMV Data

In 2013, Amy Krekelberg received an unsettling notice from Minnesota’s Department of Natural Resources: An employee had abused his access to a government driver’s license database and snooped on thousands of people in the state, mostly women. Krekelberg learned that she was one of them. When Krekelberg asked for an audit of accesses to her DMV records, as allowed by Minnesota state law, she learned that her information—which would include…

June 21, 2019
Read More >>