Subscribe now
A server on fire

Hackers can make computers destroy their own chips with electricity

19 January 2023

A feature of server motherboards intended to allow remote updates can be abused to trick the machines into damaging themselves beyond repair


Ukraine map with blue and yellow meshline. Cyber war against Russia over Ukraine.; Shutterstock ID 2148187449; purchase_order: -; job: -; client: -; other: -

Ukraine's army of hackers failed to thwart Russia and quickly gave up

1 September 2022

As Russia invaded Ukraine, much was made of Ukraine's volunteer "hacktivist" army, but an analysis of cyberattacks against Russia suggests they achieved little more than minor digital graffiti


Image of a person using a smartphone to hack a computerr code in the dark

Secure computers can leak data by using speakers to shake smartphones

25 August 2022

Computers could transmit highly confidential data even without internet, Wi-Fi or Bluetooth by using their speakers to transmit ultrasonic noise that vibrates nearby smartphones


Toorcamp logo

What hackers get up to when left on an island in the Pacific

17 August 2022

Campsite coding Deerpunk costumes, tacos delivered by drones and a game called "Beerocracy" featured at this year's ToorCamp for hackers – it was a blast, writes Annalee Newitz


LONDON, ENGLAND - APRIL 12: A police officer walks past 10 Downing Street on April 12, 2022 in London, England. (Photo by Rob Pinney/Getty Images)

UK prime minister's office smartphones targeted by Pegasus spyware

19 April 2022

Researchers claim to have uncovered cyberattacks using Pegasus software against 10 Downing Street and the Foreign and Commonwealth Office


Electronic circuit board close up.; Shutterstock ID 1295678530; purchase_order: -; job: -; client: -; other: -

Harmful chips hidden on circuit boards revealed by their power use

18 April 2022

Careful observation of the power consumption of a circuit board can reveal telltale signs that an attacker has tampered with it and installed a malicious device designed to steal sensitive information or cause crashes, say researchers


Security vulnerability Log4J detected. 3d illustration.; Shutterstock ID 2091644746; purchase_order: -; job: -; client: -; other: -

UK companies could face fines for failing to patch Log4j vulnerability

19 January 2022

A security flaw discovered in December 2021 makes private data vulnerable to hackers – and the UK government could take action against firms that fail to fix it


iPhones

NSO iPhone malware builds a computer inside your phone to steal data

16 December 2021

An incredibly sophisticated piece of malware developed by the Israeli tech firm NSO Group works by creating an entirely separate computer inside the memory of an iPhone, allowing attackers to snoop and steal data


Science technology concept. AI (Artificial Intelligence).

GitHub's AI programming assistant can introduce security flaws

2 September 2021

AI that automatically generates source code to help human programmers complete projects has been found to include bugs or security flaws in up to 40 per cent of the code it outputs


Facebook logos

Hackers act differently if accessing male or female Facebook profiles

10 March 2021

Cybercriminals seem to behave differently depending on the age and gender of the owner of the Facebook accounts they hack into


Sign up to our weekly newsletter

Receive a weekly dose of discovery in your inbox. We'll also keep you up to date with New Scientist events and special offers.

Sign up
Piano Exit Overlay Banner Mobile Piano Exit Overlay Banner Desktop