Home Authors Posts by Lorenzo Franceschi-Bicchierai

Lorenzo Franceschi-Bicchierai

22 POSTS 0 COMMENTS
A crypto wallet maker claimed this week that hackers may be targeting people with an iMessage “zero-day” exploit — but all signs point to an exaggerated threat, if not a downright scam. Trust Wallet’s official X (previously Twitter) account wrote that “we have credible intel regarding a high-risk zero-day exploit...
On Sunday, the world of video games was shaken by a hacking and cheating scandal. During a competitive esports tournament of Apex Legends, a free-to-play shooter video game played by hundreds of thousands of players daily, hackers appeared to insert cheats into the games of two well-known streamers — effectively...
The Pokemon Company said it detected hacking attempts against some of its users and reset those user account passwords. Last week, an alert was visible on Pokemon’s official support website, which said that “following an attempt to compromise our account system, Pokemon proactively locked the accounts of fans who might...
On Sunday, two competitive esports players appeared to get hacked during a live streamed game, prompting the organizers to postpone the tournament. Players were competing in the Apex Legends Global Series, a competitive esports tournament for the popular shooter game Apex Legends, which has a $5 million total prize pool. During...
In his quest to turn a simple and functioning Twitter app into X, the everything app that doesn’t do anything very well, Elon Musk launched audio and video calling on X last week — and this new feature is switched on by default, it leaks your IP address to...
Over the weekend, someone posted a cache of files and documents apparently stolen from the Chinese government hacking contractor, I-Soon. This leak gives cybersecurity researchers and rival governments an unprecedented chance to look behind the curtain of Chinese government hacking operations facilitated by private contractors. Like the hack-and-leak operation that targeted...
In July 2021, someone sent Google a batch of malicious code that could be used to hack Chrome, Firefox, and PCs running Windows Defender. That code was part of an exploitation framework called Heliconia. And at the time, the exploits used to target those applications were zero-days, meaning the...
Smashed iPhones are seen during COP28 in Dubai, United Arab Emirates on November 30, 2023. Image Credits: Beata Zawrzel/NurPhoto via Getty Images In 2019, Apple announced it would start sending some security researchers a “special” version of the iPhone designed to be used to find vulnerabilities, which could then be...
Internet monitoring firms say a near-total internet blackout in Gaza is reaching its seventh day, the longest outage of the ongoing Israel-Hamas conflict so far. Doug Madory, the director of internet analysis at Kentik, told TechCrunch in a Signal message that this is the “longest internet blackout ever and longer...
Two days before 23andMe disclosed that hackers had accessed the personal and genetic data of almost seven million customers, the genetic testing giant updated its terms of service. The changes are an effort to make it more difficult for the victims of the breach to band together in filing...