Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    We handpicked 30 October Prime Day deals you can get for under $25

    October 7, 2025

    Nobel Prize in Physics goes to early research that led to today’s quantum computers

    October 7, 2025

    Mastodon snags Bluesky’s starter packs feature and includes the ability to opt out

    October 7, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » How 3 Million ‘Hacked’ Toothbrushes Became a Cyber Urban Legend
    Security

    How 3 Million ‘Hacked’ Toothbrushes Became a Cyber Urban Legend

    News RoomBy News RoomFebruary 12, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Documents exclusively obtained by WIRED reveal that AI surveillance software tracked thousands of people using the London Underground to detect crime or unsafe situations. The machine learning software scoured live CCTV footage to spot aggressive behavior, weapons being brandished, and people dodging fares. The documents also detail errors made during the trial—for instance, mistakenly identifying children walking with their parents as fare evaders.

    Meanwhile, on Wednesday, cryptocurrency tracing firm Chainalysis published a report finding ransomware payments in 2023 reached over $1.1 billion, the highest annual total ever recorded. The record-breaking sum of extorted funds was due to two things: the high number of ransomware attacks and the amount of money that hackers were demanding from victims, many of whom were targeted specifically for their ability to pay and their inability to sustain a prolonged disruption of services.

    A tech company, notorious for keeping websites with far-right and other extreme content online, was bought last year by a secretive company whose business is to help set up businesses, often in ways that keep details of those companies secret, WIRED reported on Thursday. Registered Agents Inc.’s acquisition of Epik may allow the shadowy company to provide its customers with another layer of anonymity.

    For the past month, senior security reporter Matt Burgess has been transitioning away from using passwords to log in to his hundreds of online accounts. Instead, he’s using passkeys, a more secure form of authentication that uses generated codes stored on your device to log in to websites and apps using a biometric identifier like a fingerprint, face scan, or PIN. When it works, it’s seamless and secure. When it doesn’t, it’s a mess.

    WhatsApp is developing a feature to allow its users to message across apps, all while maintaining its secure end-to-end encryption. In theory, the move would allow users to chat with people on WhatsApp using apps like Signal or Telegram. It’s unclear which companies, if any, will link their services with WhatsApp.

    And there’s more. Each week, we highlight the news we didn’t cover in-depth ourselves. Click on the headlines below to read the full stories. And stay safe out there.

    Hackers have, in the real world, caused blackouts, set fire to a steel mill, and released worms that took down medical record systems in hospitals across the US and the UK. So it hardly seems necessary to invent new nightmares about them taking over our toothbrushes.

    Yet, when the Swiss newspaper Aargauer Zeitung published a story that cybercriminals had infected 3 million internet-connected toothbrushes with malware, then used them to launch a cyberattack that downed a website for four hours and caused millions of dollars in damage, the tale was somehow irresistible. This week, news outlets around the world picked up the story, which quoted the cybersecurity firm Fortinet as its source, spinning it out as the perfect illustration of how hackers can exploit the most mundane technology for epic malevolence. “This example, which seems like a Hollywood scenario, actually happened,” the Swiss newspaper wrote.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous Article2054, Part IV: A Nation Divided
    Next Article When a funeral is clickbait

    Related Posts

    Google’s Latest AI Ransomware Defense Only Goes So Far

    October 6, 2025

    Where Do Your Passwords Go When You Die?

    October 4, 2025

    DHS Has Been Collecting US Citizens’ DNA for Years

    September 30, 2025

    ‘SIM Farms’ Are a Spam Plague. A Giant One in New York Threatened US Infrastructure, Feds Say

    September 30, 2025

    Russia Tests Hypersonic Missile at NATO’s Doorstep—and Shares the Video

    September 29, 2025

    Heritage Foundation Uses Bogus Stat to Push a Trans Terrorism Classification

    September 29, 2025
    Our Picks

    Nobel Prize in Physics goes to early research that led to today’s quantum computers

    October 7, 2025

    Mastodon snags Bluesky’s starter packs feature and includes the ability to opt out

    October 7, 2025

    The best laptop deals you can get for Amazon’s October Prime Day

    October 7, 2025

    Facebook is turning into TikTok

    October 7, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    Apple’s latest iPad is down to its best price yet for October Prime Day

    By News RoomOctober 7, 2025

    The iPad has become so popular that many people (sorry, mom!) often say it when…

    OpenAI Wants ChatGPT to Be Your Future Operating System

    October 7, 2025

    Scientists Made Human Eggs From Skin Cells and Used Them to Form Embryos

    October 7, 2025

    Police bust gang suspected of stealing 40,000 phones

    October 7, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.