Skip to Content
Uncategorized

Security Researchers Must Think More Like Crooks

August 2, 2017

When the Shadow Brokers published NSA hacking tools online, cybersecurity firms shrugged: the exploits looked like relics. But criminals went on to use them for huge attacks like WannaCry and NotPetya. In a report published today, security firm Rapid7 urges experts to think about such leaks like crooks might. Rebekah Brown, Rapid7’s threat intelligence lead, told the Download that more attacks will use leaked tools in coming months—so a change in mindset better come soon.

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

The problem with plug-in hybrids? Their drivers.

Plug-in hybrids are often sold as a transition to EVs, but new data from Europe shows we’re still underestimating the emissions they produce.

Google DeepMind’s new generative model makes Super Mario–like games from scratch

Genie learns how to control games by watching hours and hours of video. It could help train next-gen robots too.

How scientists traced a mysterious covid case back to six toilets

When wastewater surveillance turns into a hunt for a single infected individual, the ethics get tricky.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.