Hackers Can Now Trick USB Chargers To Destroy Your Devices—This Is How It Works

Hackers Can Now Trick USB Chargers To Destroy Your Devices—This Is How It Works

Not all cyberattacks focus on data theft. Sometimes the intent is “to achieve the destruction of the physical world through digital means,” Chinese tech giant…

View More Hackers Can Now Trick USB Chargers To Destroy Your Devices—This Is How It Works
Airplane Hack Exposes Weaknesses of Alert and Avoidance Systems

Airplane Hack Exposes Weaknesses of Alert and Avoidance Systems

The aircraft safety system known as the Traffic Alert and Collision Avoidance System (TCAS) can be coerced into sending an airplane on a mid-air rollercoaster…

View More Airplane Hack Exposes Weaknesses of Alert and Avoidance Systems
How a Hacker's Mom Broke Into a Prison—and the Warden's Computer

How a Hacker’s Mom Broke Into a Prison—and the Warden’s Computer

John Strand breaks into things for a living. As a penetration tester, he gets hired by organizations to attack their defenses, helping reveal weaknesses before…

View More How a Hacker’s Mom Broke Into a Prison—and the Warden’s Computer