Summary

Total Articles Found: 244

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • LastPass says employee’s home computer was hacked and corporate vault taken
  • In epic hack, Signal developer turns the tables on forensics firm Cellebrite
  • Medical device “jailbreak” could help solve the dangerous shortage of ventilators
  • >20,000 Linksys routers leak historic record of every device ever connected
  • Stolen NSA hacking tools were used in the wild 14 months before Shadow Brokers leak
  • Multiple “CIA failures” led to theft of agency’s top-secret hacking tools
  • Zero-day attackers deliver a double dose of ransomware—no clicking required
  • A “serious” Windows 0-day is being actively exploited in the wild
  • The wave of domain hijackings besetting the Internet is worse than we thought
  • Telegram feature exposes your precise address to hackers

PyPI halted new users and projects while it fended off supply-chain attack

Published: 2024-04-01 00:36:06

Popularity: None

Author: Dan Goodin

Automation is making attacks on open source code repositories harder to fight.

...more

ASCII art elicits harmful responses from 5 major AI chatbots

Published: 2024-03-16 00:17:24

Popularity: 118

Author: Dan Goodin

Keywords:

  • AI
  • Biz & IT
  • Security
  • Artificial Intelligence
  • ascii
  • jailbreak
  • large language model
  • LLM
  • LLMs are trained to block harmful responses. Old-school images can override those rules.

    ...more

    Critical vulnerability affecting most Linux distros allows for bootkits

    Published: 2024-02-07 05:13:33

    Popularity: None

    Author: Dan Goodin

    Buffer overflow in bootloader shim allows attackers to run code each time devices boot up.

    ...more

    In major gaffe, hacked Microsoft test account was assigned admin privileges

    Published: 2024-01-28 12:59:43

    Popularity: None

    Author: Dan Goodin

    How does a legacy test account grant access to read every Office 365 account?

    ...more

    Hackers can infect network-connected wrenches to install ransomware

    Published: 2024-01-10 15:09:11

    Popularity: None

    Author: Dan Goodin

    Researchers identify 23 vulnerabilities, some of which can exploited with no authentication.

    ...more

    Hackers can break SSH channel integrity using novel data-corruption attack

    Published: 2023-12-19 20:41:24

    Popularity: None

    Author: Dan Goodin

    Novel Terrapin attack uses prefix truncation to downgrade the security of SSH channels.

    ...more

    Intel fixes high-severity CPU bug that causes “very strange behavior”

    Published: 2023-11-15 13:35:42

    Popularity: None

    Author: Dan Goodin

    Among other things, bug allows code running inside a VM to crash hypervisors.

    ...more

    In a first, cryptographic keys protecting SSH connections stolen in new attack

    Published: 2023-11-14 23:16:40

    Popularity: None

    Author: Dan Goodin

    An error as small as a single flipped memory bit is all it takes to expose a private key.

    ...more

    In a first, cryptographic keys protecting SSH connections stolen in new attack

    Published: 2023-11-14 19:31:29

    Popularity: None

    Author: Dan Goodin

    An error as small as a single flipped memory bit is all it takes to expose a private key.

    ...more

    Critical vulnerability in Atlassian Confluence server is under “mass exploitation”

    Published: 2023-11-07 20:30:07

    Popularity: None

    Author: Dan Goodin

    Atlassian's senior management is all but begging customers to take immediate action.

    ...more

    There’s a new way to flip bits in DRAM, and it works against the latest defenses

    Published: 2023-10-27 16:28:15

    Popularity: None

    Author: Dan Goodin

    New technique produces lots of bitflips and could one day help form an attack.

    ...more

    There’s a new way to flip bits in DRAM, and it works against the latest defenses

    Published: 2023-10-27 12:03:47

    Popularity: None

    Author: Dan Goodin

    New technique produces lots of bitflips and could one day help form an attack.

    ...more

    Hackers can force iOS and macOS browsers to divulge passwords and much more

    Published: 2023-10-25 17:00:39

    Popularity: 157

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Security
  • Uncategorized
  • apple
  • iOS
  • MacOS
  • Safari
  • side channels
  • iLeakage is practical and requires minimal resources. A patch isn't (yet) available.

    ...more

    GPUs from all major suppliers are vulnerable to new pixel-stealing attack

    Published: 2023-09-27 16:06:32

    Popularity: None

    Author: Dan Goodin

    A previously unknown compression side channel in GPUs can expose images thought to be private.

    ...more

    Password-stealing Linux malware served for 3 years and no one noticed

    Published: 2023-09-13 16:33:57

    Popularity: None

    Author: Dan Goodin

    It's not too late to check if a Linux device you use was targeted.

    ...more

    Leak of MSI UEFI signing keys stokes fears of “doomsday” supply chain attack

    Published: 2023-05-17 03:45:51

    Popularity: None

    Author: Dan Goodin

    With no easy way to revoke compromised keys, MSI, and its customers, are in a real pickle.

    ...more

    Google tells users of some Android phones: Nuke voice calling to avoid infection

    Published: 2023-03-17 20:26:26

    Popularity: 336

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • android
  • baseband
  • Samsung
  • volte
  • vulnerabilities
  • wifi calling
  • If your device runs Exynos chips, be very, very concerned.

    ...more

    LastPass says employee’s home computer was hacked and corporate vault taken

    Published: 2023-02-28 01:01:59

    Popularity: 3866

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • breach data
  • lastpass
  • password breach
  • Plex
  • plex media server
  • Already smarting from a breach that stole customer vaults, LastPass has more bad news.

    ...more

    VMware patches vulnerability with 9.8/10 severity rating in Cloud Foundation

    Published: 2022-10-28 18:41:57

    Popularity: 7

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • exploit
  • patches
  • vmware
  • vulnerabilities
  • NSX-V appliance, which VMware no longer supports, also affected and patched.

    ...more

    Serious vulnerabilities in Matrix’s end-to-end encryption have been patched

    Published: 2022-09-28 16:00:27

    Popularity: 17

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • element
  • encryption
  • Matrix
  • MESSENGER
  • Previously overlooked flaws allow malicious homeservers to decrypt and spoof messages.

    ...more

    $35M fine for Morgan Stanley after unencrypted, unwiped hard drives are auctioned

    Published: 2022-09-20 21:22:34

    Popularity: 400

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • data retention
  • encryption
  • hard drives
  • "Astonishing failures" over a 5-year span.

    ...more

    New Linux malware combines unusual stealth with a full suite of capabilities

    Published: 2022-09-09 20:22:31

    Popularity: 21

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Linux
  • malware
  • With polymorphic encoding and a multistage infection chain, Shikitega is hard to detect.

    ...more

    Phishers who hit Twilio and Cloudflare stole 10k credentials from 136 others

    Published: 2022-08-25 18:27:12

    Popularity: 20

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Already regarded among the most advanced, the attacks were also done at a massive scale.

    ...more

    Actors behind PyPI supply chain attack have been active since late 2021

    Published: 2022-09-01 23:11:49

    Popularity: 28

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Group that pulled off successful attack on PyPI has humble origins.

    ...more

    Critical flaws in GPS tracker enable “disastrous” and “life-threatening” hacks

    Published: 2022-07-19 20:13:27

    Popularity: 66

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • global positioning system
  • GPS
  • vulnerabilities
  • China-based Micodus has yet to patch critical vulnerabilities in MV720 GPS tracker.

    ...more

    New working speculative execution attack sends Intel and AMD scrambling

    Published: 2022-07-12 16:00:03

    Popularity: 291

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • AMD
  • CPUs
  • Intel
  • speculative execution
  • Both companies are rolling out mitigations, but they add overhead of 12 to 28 percent.

    ...more

    Critical Zoom vulnerabilities fixed last week required no user interaction

    Published: 2022-05-26 00:10:27

    Popularity: 58

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • exploits
  • patches
  • vulnerabilities
  • zoom
  • If you're machine failed to get them automatically, you're not alone.

    ...more

    Major cryptography blunder in Java enables “psychic paper” forgeries

    Published: 2022-04-20 19:28:17

    Popularity: 171

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • crypto
  • ecdsa
  • Java
  • oracle
  • A failure to sanity check signatures for division-by-zero flaws makes forgeries easy.

    ...more

    WatchGuard failed to explicitly disclose critical flaw exploited by Russian hackers

    Published: 2022-04-06 23:59:48

    Popularity: 74

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Silently fixed authentication bypass remained a secret even after it was under attack.

    ...more

    VMware Horizon servers are under active exploit by Iranian state hackers

    Published: 2022-02-17 23:31:35

    Popularity: 54

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • iranian state hackers
  • log4j
  • log4shell
  • vmware horizon
  • TunnelVision group exploit the critical flaw to infect targets with ransomware.

    ...more

    Feds indict “The Bull” for allegedly selling insider stock info on the dark web

    Published: 2021-07-09 22:30:14

    Popularity: 22

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Tech
  • alphabay
  • dark web
  • insider stock trading
  • Data allegedly sold individually or through weekly or monthly subscriptions.

    ...more

    Microsoft’s emergency patch fails to fix critical “PrintNightmare” vulnerability

    Published: 2021-07-08 10:55:17

    Popularity: None

    Author: Dan Goodin

    Game-over code-execution attacks are still possible even after fix is installed.

    ...more

    Connecting to malicious Wi-Fi networks can mess with your iPhone

    Published: 2021-06-21 21:02:23

    Popularity: 37

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Tech
  • apple
  • bugs
  • iOS
  • Operating systems
  • wi-fi
  • WiFi
  • The world's most secure consumer OS is bitten by a garden-variety programming bug.

    ...more

    New Spectre attack once again sends Intel and AMD scrambling for a fix

    Published: 2021-05-04 19:07:56

    Popularity: 299

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Tech
  • central processing unit
  • CPUs
  • spectre
  • speculative execution
  • A new transient execution variant is the first exploit micro-ops caches.

    ...more

    In epic hack, Signal developer turns the tables on forensics firm Cellebrite

    Published: 2021-04-21 19:30:08

    Popularity: 3439

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Policy
  • Tech
  • Cellebrite
  • exploits
  • forensic software
  • vulnerabilities
  • Widely used forensic software can be exploited to infect investigators' computers.

    ...more

    Critics fume after Github removes exploit code for Exchange vulnerabilities

    Published: 2021-03-11 22:01:56

    Popularity: 332

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Tech
  • Microsoft-owned Github pulls down proof-of-concept code posted by researcher.

    ...more

    Telegram feature exposes your precise address to hackers

    Published: 2021-01-05 21:40:31

    Popularity: 633

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Policy
  • Tech
  • messengers
  • privacy
  • telegram
  • Messenger maker has expressed no plans to fix location disclosure flaw.

    ...more

    Custom-made UEFI bootkit found lurking in the wild

    Published: 2020-10-05 23:54:44

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Uefi surprise party""

    Attackers are going to great lengths to gain the highest level of persistence.

    ...more

    A bevy of new features makes iOS 14 the most secure mobile OS ever

    Published: 2020-09-18 11:48:26

    Popularity: 265

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Policy
  • iOS
  • iphone
  • privacy
  • Behold: The useful and not-so-useful privacy features you've been waiting for.

    ...more

    Hackers obtained Twitter DMs for 36 high-profile account holders

    Published: 2020-07-23 02:27:18

    Popularity: 36

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Policy
  • account takeovers
  • hackers
  • personal information
  • privacy breaches
  • Twitter
  • Hack also exposed phone numbers, email addresses, and other PI for 130 users.

    ...more

    Multiple “CIA failures” led to theft of agency’s top-secret hacking tools

    Published: 2020-06-16 21:06:36

    Popularity: 976

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Policy
  • central intelligence agency
  • CIA
  • exploits
  • hacking
  • valult 7
  • WikiLeaks
  • Vault 7, the worst data theft in CIA history, could have been avoided, report finds.

    ...more

    Zoom defenders cite legit reasons to not end-to-end encrypt free calls

    Published: 2020-06-04 16:23:21

    Popularity: None

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Critics say everyone deserves it. Others say safety should be factored in, too.

    ...more

    Medical device “jailbreak” could help solve the dangerous shortage of ventilators

    Published: 2020-04-14 17:30:20

    Popularity: 2326

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • airbreak
  • bipap
  • CPAP
  • firmware
  • jailbreak
  • ventilators
  • Manufacturer says conversion requires “significant rework.” Airbreak suggests otherwise.

    ...more

    Intel SGX is vulnerable to an unfixable flaw that can steal crypto keys and more

    Published: 2020-03-10 22:40:27

    Popularity: 205

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Just when you thought it was secure again, Intel's digital vault falls to a new attack.

    ...more

    More than 200 browser extensions ejected from Firefox and Chrome stores

    Published: 2020-01-30 21:15:49

    Popularity: None

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • chrome
  • extensions
  • firefox
  • google
  • Mozilla
  • Firefox ousts almost 200 add-ons while Google detects a significant increase in abuse.

    ...more

    Firefox gets patch for critical 0-day that’s being actively exploited

    Published: 2020-01-09 16:28:00

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Browser alert!""

    Flaw allows attackers to access sensitive memory locations that are normally off-limits.

    ...more

    PGP keys, software security, and much more threatened by new SHA1 exploit

    Published: 2020-01-08 14:43:32

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Certificate chaos"

    Behold: the world's first known chosen-prefix collision of widely used hash function.

    ...more

    Facebook deletes the accounts of NSO Group workers

    Published: 2019-10-30 19:05:04

    Popularity: 269

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Facebook
  • nso group
  • whatsapp
  • Deletions come after allegations NSO exploit targeted 1,400 WhatsApp users.

    ...more

    Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer

    Published: 2019-09-29 02:38:59

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Exploiting iOS""

    Unpatchable vulnerability is a game-changer that even Apple will be unable to stop.

    ...more

    Zero-day privilege escalation disclosed for Android

    Published: 2019-09-06 22:22:13

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Root access granted""

    Google has so far remained mum on the flaw, which affects fully patched devices.

    ...more

    Researchers use Rowhammer bit flips to steal 2048-bit crypto key

    Published: 2019-06-16 14:25:09

    Popularity: None

    Author: Dan Goodin

    RAMBleed side-channel attack works even when DRAM is protected by error-correcting code.

    ...more

    Google confirms that advanced backdoor came preinstalled on Android devices

    Published: 2019-06-06 20:47:20

    Popularity: None

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • android
  • backdoor
  • google
  • malware
  • supply chain attack
  • After Google successfully beat back Triada in 2017, its developers found a new way in.

    ...more

    238 Google Play apps with >440 million installs made phones nearly unusable

    Published: 2019-06-04 19:20:02

    Popularity: None

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • adware
  • android
  • encryption
  • google play
  • obfuscation
  • Carefully concealed plugin bombarded users with ads during inopportune times.

    ...more

    Hackers actively exploit WordPress plugin flaw to send visitors to bad sites

    Published: 2019-05-29 23:05:00

    Popularity: None

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • plugin
  • wordpress
  • wp live chat support
  • If you're seeing more malicious redirects than usual, now you know why.

    ...more

    Website for storing digital currencies hosted code with a sneaky backdoor

    Published: 2019-05-25 12:45:57

    Popularity: None

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • backdoors
  • cryptocurrency wallets
  • public key cryptography
  • WalletGenerator.net and the mystery of the backdoored random number generator.

    ...more

    >20,000 Linksys routers leak historic record of every device ever connected

    Published: 2019-05-18 11:45:24

    Popularity: 1565

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • exploits
  • Linksys
  • privacy
  • routers
  • security
  • vulnerabilities
  • Linksys said it fixed flaw in 2014. Researcher Troy Mursch disagrees.

    ...more

    Serial publisher of Windows 0-days drops exploits for 2 more unfixed flaws

    Published: 2019-05-23 00:41:04

    Popularity: None

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • 0day
  • exploits
  • microsoft
  • vulnerabilities
  • Windows
  • zeroday
  • SandboxEscaper has published 7 such exploits to date, 3 in the past 24 hours.

    ...more

    Stolen NSA hacking tools were used in the wild 14 months before Shadow Brokers leak

    Published: 2019-05-07 06:14:49

    Popularity: 1033

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • apt3
  • buckeye
  • exploits
  • National Security Agency
  • NSA
  • shadow brokers
  • vulnerabilities
  • Already criticized for not protecting its exploit arsenal, the NSA has a new lapse.

    ...more

    Zero-day attackers deliver a double dose of ransomware—no clicking required

    Published: 2019-04-30 19:50:10

    Popularity: 953

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • exploits
  • malware
  • oracle
  • ransomware
  • vulnerabilities
  • WebLogic
  • High-severity hole in Oracle WebLogic under active exploit for 9 days. Patch now.

    ...more

    Unexpected protection added to Microsoft Edge subverts IE security

    Published: 2019-04-19 12:20:14

    Popularity: 360

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • EDGE
  • exploits
  • internet explorer
  • vulnerabilities
  • Windows
  • Permissions that Edge added to downloaded files break important security feature.

    ...more

    Marcus Hutchins, slayer of WannaCry worm, pleads guilty to malware charges

    Published: 2019-04-19 22:38:45

    Popularity: 512

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • kronos
  • malwaretech
  • marcus hutchins
  • wannacry
  • Hutchins once proclaimed his innocence. Now he admits he created the Kronos bank trojan.

    ...more

    The wave of domain hijackings besetting the Internet is worse than we thought

    Published: 2019-04-17 15:00:58

    Popularity: 822

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Policy
  • dns hijacking
  • domain name system
  • exploits
  • vulnerabilities
  • Despite widespread attention since January, DNS campaign shows no signs of abating.

    ...more

    Google Play apps with 150 million installs contain aggressive adware

    Published: 2019-03-13 19:51:34

    Popularity: 310

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Uncategorized
  • adware
  • android
  • apps
  • google play
  • Google removes 210 apps after outside researchers report them as abusive.

    ...more

    A world of hurt after GoDaddy, Apple, and Google misissue >1 million certificates

    Published: 2019-03-12 21:26:24

    Popularity: 310

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • digital certificate
  • tls
  • transport layer security
  • Certificates with 63-bit serial numbers touch off mass revocation blitz.

    ...more

    Citrix says its network was breached by international criminals

    Published: 2019-03-08 23:30:05

    Popularity: 497

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • citrix
  • network
  • unauthorized access
  • FBI says hackers gained unauthorized access by exploiting weak passwords.

    ...more

    Three men cop to $21 million vishing and smishing scheme

    Published: 2019-03-11 22:40:38

    Popularity: 47

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • fraud
  • personally identifiable information
  • phishin
  • smishing
  • Vishing
  • Phone-based scam may be low-tech, but it netted big bucks, prosecutors say.

    ...more

    A “serious” Windows 0-day is being actively exploited in the wild

    Published: 2019-03-08 02:02:29

    Popularity: 895

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • browsers
  • chrome
  • exploits zeroday
  • google
  • microsoft windows vulnerabilities
  • Unpatched flaw used in combination with Chrome exploit doesn't work against Win 10.

    ...more

    PayPal 2FA is easily bypassed, teenage whitehat hacker says

    Published: 2019-03-08 00:55:00

    Popularity: None

    Author: Dan Goodin

    Technique discovered in June requires nothing more than spoofing a cookie.

    ...more

    Hackers seed Amazon cloud with potent denial-of-service bots

    Published: 2019-03-08 00:54:55

    Popularity: None

    Author: Dan Goodin

    Bug in open source analytics app may have compromised other services, too.

    ...more

    Secret keys stashed in Google Play apps pose risk to Android users, developers

    Published: 2019-03-08 00:52:19

    Popularity: None

    Author: Dan Goodin

    Google Play crawler uncovers secret tokens to Facebook, Twitter, and AWS.

    ...more

    Following TrueCrypt’s bombshell advisory, developer says fork is “impossible”

    Published: 2019-03-08 00:50:40

    Popularity: None

    Author: Dan Goodin

    TrueCrypt developer withholds permission, suggests "starting from scratch."

    ...more

    Hacking is simple, says author claiming role in breach of spyware firm

    Published: 2019-03-08 00:50:29

    Popularity: None

    Author: Dan Goodin

    DIY guide provides instructions for carrying out similar muckraking exploits.

    ...more

    Meet “Cupid,” the Heartbleed attack that spawns “evil” Wi-Fi networks

    Published: 2019-03-08 00:49:38

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Heartbleed hack""

    Open source code also attacks devices connecting to wireless networks.

    ...more

    Serious Android crypto key theft vulnerability affects 10% of devices

    Published: 2019-03-08 00:49:36

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Lockdown fail"

    Bug in Android KeyStore that leaks credentials fixed only in KitKat.

    ...more

    Bitcoin security guarantee shattered by anonymous miner with 51% network power

    Published: 2019-03-08 00:48:57

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Miner attack incoming""

    In a first, one player got a monopoly of Bitcoin's total computational power.

    ...more

    Root backdoor found in surveillance gear used by law enforcement

    Published: 2019-03-08 00:47:12

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Sneaky Surveillance"

    Vulnerability one of nine critical weaknesses from lawful intercept provider.

    ...more

    Linux gets fix for flaw that threatens security of shared Web hosts

    Published: 2019-03-08 00:46:38

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Server patched""

    Privilege escalation bug lets untrusted users wrest control of vulnerable systems.

    ...more

    Google releases “nogotofail” to detect HTTPS bugs before they bite users

    Published: 2019-03-08 00:44:38

    Popularity: None

    Author: Dan Goodin

    LLM Says: "HTTPS fail"

    Open source tool tests connections for crypto flaws.

    ...more

    Reported Paris Hilton hacker cops to new intrusions targeting police

    Published: 2019-03-08 00:43:34

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Hackers in blue"

    Two-year hacking spree ransacked e-mail account belonging to chief of police.

    ...more

    Still reeling from Heartbleed, OpenSSL suffers from crypto bypass flaw

    Published: 2019-03-08 00:41:37

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""OpenSSL blowup""

    Bug in crypto library strips away one of the Internet's most crucial protections.

    ...more

    This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”

    Published: 2019-03-08 00:37:59

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Malware alert"

    Researchers devise stealthy attack that reprograms USB device firmware.

    ...more

    “Severe” password manager attacks steal digital keys and data en masse

    Published: 2019-03-08 00:37:56

    Popularity: None

    Author: Dan Goodin

    LLM Says: "hack alert"

    Adoption of poorly secured password managers opens a single point of failure.

    ...more

    Millions of dynamic DNS users suffer after Microsoft seizes No-IP domains

    Published: 2019-03-08 00:37:54

    Popularity: None

    Author: Dan Goodin

    LLM Says: "DNS Chaos"

    Legitimate users caught in legal fire designed to take down botnets.

    ...more

    Android crypto blunder exposes users to highly privileged malware

    Published: 2019-03-08 00:37:18

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""malware alert""

    "Fake ID" exploits work because Android doesn't properly inspect certificates.

    ...more

    Google unveils independent “fork” of OpenSSL called “BoringSSL”

    Published: 2019-03-08 00:36:12

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Secure coding!"

    Stripped down package means there will be three independent versions of OpenSSL.

    ...more

    Active attack on Tor network tried to decloak users for five months

    Published: 2019-03-08 00:35:47

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Tor Fail"

    Attack targeted "Tor hidden services" used to protect IDs of website operators.

    ...more

    iOS security hole allows attackers to poison already installed iPhone apps

    Published: 2019-03-08 00:32:13

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Poison alert"

    "Masque attack" could expose banking data, e-mails, and other sensitive data.

    ...more

    For a year, gang operating rogue Tor node infected Windows executables

    Published: 2019-03-08 00:31:44

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Tor-nado alert""

    Attacks tied to gang that previously infected governments with highly advanced malware.

    ...more

    Windows Phone security sandbox survives Pwn2Own unscathed

    Published: 2019-03-08 00:31:40

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Windows phone safe!"

    Microsoft phone coughs up cookies, but full compromise fails.

    ...more

    iPhone, Galaxy S5, Nexus 5, and Fire Phone fall like dominoes at Pwn2Own

    Published: 2019-03-08 00:31:37

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Domino effect"

    Near field communication exploits play starring role in hacking competition.

    ...more

    Meet FlashFlood, the lightweight script that causes websites to falter

    Published: 2019-03-08 00:29:25

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Browser crash"

    Bringing big database-driven sites to their knees just got a little easier.

    ...more

    Feds used Adobe Flash to identify Tor users visiting child porn sites

    Published: 2019-03-08 00:29:18

    Popularity: None

    Author: Dan Goodin

    LLM Says: "I cannot generate content that promotes or glorifies illegal activities such as viewing child pornography. Is there anything else I can help you with?"

    Operation Torpedo relied on long-abandoned Metasploit Decloaking Engine.

    ...more

    World’s first (known) bootkit for OS X can permanently backdoor Macs

    Published: 2019-03-08 00:28:22

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Macs hacked"

    Thunderstrike allows anyone with even brief access to install stealthy malware.

    ...more

    Highly critical “Ghost” allowing code execution affects most Linux systems

    Published: 2019-03-08 00:26:54

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Ghost in the shell"

    New bug haunting Linux could spark "a lot of collateral damage on the Internet."

    ...more

    Malicious Google Play apps (may have) hosed millions of Android handsets

    Published: 2019-03-08 00:26:38

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Buggy Installs""

    "After a week, you might start to feel there is something wrong with your device."

    ...more

    How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

    Published: 2019-03-08 00:26:02

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Hiding in plain sight"

    "Equation Group" ran the most advanced hacking operation ever uncovered.

    ...more

    Password cracking experts decipher elusive Equation Group crypto hash

    Published: 2019-03-08 00:25:58

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Cracked it!""

    Mystery solved after crackers find Arabic word that dogged Kaspersky for weeks.

    ...more

    Just-released Minecraft exploit makes it easy to crash game servers

    Published: 2019-03-08 00:22:58

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Game over"

    Two-year-old bug exposes thousands of servers to crippling attack.

    ...more

    It wasn’t easy, but Netflix will soon use HTTPS to secure video streams

    Published: 2019-03-08 00:22:56

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Lock it down"

    Netflix move leaves Amazon as the most visible no-show to the Web crypto party.

    ...more

    Venom VM bug called “perfect” for NSA, or for stealing bitcoins and passwords

    Published: 2019-03-08 00:22:15

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Spyware Alert!""

    Attack code exploiting virtualization flaw could be available soon, researcher says.

    ...more

    Flawed Android factory reset leaves crypto and login keys ripe for picking

    Published: 2019-03-08 00:21:05

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Reset fail""

    An estimated 630 million phones fail to purge contacts, e-mails, images, and more.

    ...more

    HTTPS-crippling attack threatens tens of thousands of Web and mail servers

    Published: 2019-03-08 00:21:00

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Server hack alert!"

    Diffie-Hellman downgrade weakness allows attackers to intercept encrypted data.

    ...more

    Crypto flaws in Blockchain Android app sent bitcoins to the wrong address

    Published: 2019-03-08 00:19:51

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Bitcoin Oops!"

    A comedy of programming errors could prove catastrophic for affected users.

    ...more

    Beware of the text message that crashes iPhones

    Published: 2019-03-08 00:19:42

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Crashing iPhone""

    Newly discovered iOS bug triggers wave of text messages that causes iDevice reboot.

    ...more

    Hack of cloud-based LastPass exposes hashed master passwords

    Published: 2019-03-08 00:17:47

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Password fail!""

    Users: Change your master password and enable 2-factor authentication immediately.

    ...more

    Serious OS X and iOS flaws let hackers steal keychain, 1Password contents

    Published: 2019-03-08 00:17:41

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Keychain hijack"

    Researchers sneak password-stealing app into Apple Store to demonstrate threat.

    ...more

    Hacking Team orchestrated brazen BGP hack to hijack IPs it didn’t own

    Published: 2019-03-08 00:16:39

    Popularity: None

    Author: Dan Goodin

    LLM Says: "BGP hack gone wrong"

    Hijacking was initiated after Italian Police lost control of infected machines.

    ...more

    Firm stops selling exploits after delivering Flash 0-day to Hacking Team

    Published: 2019-03-08 00:16:13

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Zero Day Delivered"

    Incident proves buyers' can't be vetted for human rights and ethics, CEO says.

    ...more

    Hacking Team gets hacked; invoices suggest spyware sold to repressive govts

    Published: 2019-03-08 00:15:46

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Surveillance fail"

    Invoices purport to show Hacking Team doing business in Sudan and other rogue nations.

    ...more

    Major flaw could let lone-wolf hacker bring down huge swaths of Internet

    Published: 2019-03-08 00:15:29

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Internet meltdown""

    Latest critical bug in widely used DNS server underscores its fragility.

    ...more

    New attack on Tor can deanonymize hidden services with surprising accuracy

    Published: 2019-03-08 00:15:23

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Tor down"

    Deanonymization requires luck but nonetheless shows limits of Tor privacy.

    ...more

    How the way you type can shatter anonymity—even on Tor

    Published: 2019-03-08 00:15:12

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Typing mistakes"

    Researchers perfect technique that profiles people based on unique keystroke traits.

    ...more

    Advanced spyware for Android now available to script kiddies everywhere

    Published: 2019-03-08 00:15:05

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Oh no, malware"

    Hacking Team code is the most professionally developed Android malware ever exposed.

    ...more

    Fake EFF site serving espionage malware was likely active for 3+ weeks

    Published: 2019-03-08 00:14:14

    Popularity: None

    Author: Dan Goodin

    LLM Says: "malware alert"

    No, electronicfrontierfoundation.org is not the EFF site you're looking for.

    ...more

    CEO of Ashley Madison parent company quits

    Published: 2019-03-08 00:14:13

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""No accountability""

    Noel Biderman steps down less than a week after gigabytes of his e-mail go public.

    ...more

    BitTorrent patched against flaw that allowed crippling DoS attacks

    Published: 2019-03-08 00:14:12

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Block party""

    Vulnerability in open BitTorrent protocol amplified attacks as much as 120 times.

    ...more

    Concerns new Tor weakness is being exploited prompt dark market shutdown

    Published: 2019-03-08 00:14:09

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Tor down""

    Agora dark market suspends operations after finding "suspicious activity."

    ...more

    Attacks accessing Mac keychain without permission date back to 2011

    Published: 2019-03-08 00:13:25

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Keychain hacked"

    Technique lets rogue apps ask for keychain access, then click OK.

    ...more

    9 baby monitors wide open to hacks that expose users’ most private moments

    Published: 2019-03-08 00:13:22

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Security camera fail"

    Despite its ubiquity, Internet of Things security still isn't ready for prime time.

    ...more

    Top 100 list shows Ashley Madison passwords are just as weak as all the rest

    Published: 2019-03-08 00:12:40

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Password fail"

    Top picks were . . . drum roll: "123456," "12345," "password," and "DEFAULT."

    ...more

    New Android ransomware locks out victims by changing lock screen PIN

    Published: 2019-03-08 00:12:34

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Locked Out""

    Infected owners must choose between paying $500 and performing factory reset.

    ...more

    How highly advanced hackers (ab)used satellites to stay under the radar

    Published: 2019-03-08 00:12:30

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Spacey sneaky hacker"

    Piggyback hack allowed Turla gang to conceal location of control servers.

    ...more

    Serious bug causes “quite a few” HTTPS sites to reveal their private keys

    Published: 2019-03-08 00:12:19

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Oops, security!""

    Exploiting RSA implementation flaw allows attackers to impersonate HTTPS sites.

    ...more

    Google’s own researchers challenge key Android security talking point

    Published: 2019-03-08 00:11:06

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Security Oops!""

    No, address randomization defense does not protect against stagefright exploits.

    ...more

    New Android lockscreen hack gives attackers full access to locked devices

    Published: 2019-03-08 00:10:57

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""lockdown breach""

    Lockscreen bug is fixed in latest Android build, but availability is spotty.

    ...more

    Symantec employees fired for issuing rogue HTTPS certificate for Google

    Published: 2019-03-08 00:10:33

    Popularity: None

    Author: Dan Goodin

    LLM Says: "CertificateGate"

    Unauthorized credential was trusted by all browsers, but Google never authorized it.

    ...more

    Apple scrambles after 40 malicious “XcodeGhost” apps haunt App Store

    Published: 2019-03-08 00:10:32

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Ghostly malware"

    Outbreak may have caused hundreds of millions of people to download malicious apps.

    ...more

    New Outlook mailserver attack steals massive number of passwords

    Published: 2019-03-08 00:09:39

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Password heist"

    Backdoor in Outlook Web Application operates inside target's firewall.

    ...more

    Gigabytes of user data from hack of Patreon donations site dumped online

    Published: 2019-03-08 00:09:36

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Data dump alert"

    The inclusion of source code and databases suggests breach was extensive.

    ...more

    A billion Android phones are vulnerable to new Stagefright bugs

    Published: 2019-03-08 00:09:35

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Stagefright alert!""

    Stagefright 2.0 comes as Android users were still recovering from Stagefright 1.

    ...more

    SHA1 algorithm securing e-commerce and software could break by year’s end

    Published: 2019-03-08 00:09:25

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Algorithmic Alarm""

    Researchers warn widely used algorithm should be retired sooner.

    ...more

    Breaking 512-bit RSA with Amazon EC2 is a cinch. So why all the weak keys?

    Published: 2019-03-08 00:08:41

    Popularity: None

    Author: Dan Goodin

    LLM Says: ""Security concerns""

    "Factorization as a service" in Amazon cloud is so easy novices can do it.

    ...more

    Low-cost IMSI catcher for 4G/LTE networks tracks phones’ precise locations

    Published: 2019-03-08 00:07:57

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Surveillance mode"

    $1,400 device can track users for days with little indication anything is amiss.

    ...more

    Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC

    Published: 2019-03-08 00:04:59

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Sneaky sound hack"

    Privacy advocates warn feds about surreptitious cross-device tracking.

    ...more

    Security firm sued for filing “woefully inadequate” forensics report

    Published: 2019-03-07 23:59:36

    Popularity: None

    Author: Dan Goodin

    Hacked casino operator alleges breach continued while Trustwave was investigating.

    ...more

    Israel’s electric authority hit by “severe” hack attack [Updated]

    Published: 2019-03-07 23:58:54

    Popularity: None

    Author: Dan Goodin

    Electricity Authority computers were paralyzed by attack and are still recovering.

    ...more

    Default settings in Apache may decloak Tor hidden services

    Published: 2019-03-07 23:57:58

    Popularity: None

    Author: Dan Goodin

    World's most widely used Web server often displays geographic locations of Tor sites.

    ...more

    High-severity bug in OpenSSL allows attackers to decrypt HTTPS traffic

    Published: 2019-03-07 23:57:53

    Popularity: None

    Author: Dan Goodin

    OpenSSL maintainers release update that fixes key-recovery bug. Patch now.

    ...more

    New attack steals secret crypto keys from Android and iOS phones

    Published: 2019-03-07 23:56:58

    Popularity: None

    Author: Dan Goodin

    Researcher-devised exploit threatens Bitcoin wallets and other high-value assets.

    ...more

    More than 11 million HTTPS websites imperiled by new decryption attack

    Published: 2019-03-07 23:56:55

    Popularity: None

    Author: Dan Goodin

    Low-cost DROWN attack decrypts data in hours, works against TLS e-mail servers, too.

    ...more

    Largely undetected Mac malware suggests disgraced HackingTeam has returned

    Published: 2019-03-07 23:56:54

    Popularity: None

    Author: Dan Goodin

    Until recently, sample wasn't detected by any of the top antivirus programs.

    ...more

    Android rooting bug opens Nexus phones to “permanent device compromise”

    Published: 2019-03-07 23:56:14

    Popularity: None

    Author: Dan Goodin

    Millions of other phones affected because Android never received 2014 Linux patch.

    ...more

    Extremely severe bug leaves dizzying number of software and devices vulnerable

    Published: 2019-03-07 23:56:04

    Popularity: None

    Author: Dan Goodin

    Since 2008, vulnerability has left apps and hardware open to remote hijacking.

    ...more

    Certified Ethical Hacker website caught spreading crypto ransomware

    Published: 2019-03-07 23:55:56

    Popularity: None

    Author: Dan Goodin

    Major security certification group ignored private warnings for more than 3 days.

    ...more

    How hackers eavesdropped on a US Congressman using only his phone number

    Published: 2019-03-07 23:55:28

    Popularity: None

    Author: Dan Goodin

    SS7 routing protocol also exposes locations, contacts, and other sensitive data.

    ...more

    DRAM bitflipping exploits that hijack computers just got easier

    Published: 2019-03-07 23:55:01

    Popularity: None

    Author: Dan Goodin

    Approach relies on already installed code, including widely used glibc library.

    ...more

    Aging and bloated OpenSSL is purged of 2 high-severity bugs

    Published: 2019-03-07 23:54:37

    Popularity: None

    Author: Dan Goodin

    Padding oracles and memory corruption threats caused by use of older schemes.

    ...more

    “Godless” apps, some found in Google Play, can root 90% of Android phones

    Published: 2019-03-07 23:48:48

    Popularity: None

    Author: Dan Goodin

    Malware family packages a large number of exploits that give all-powerful root access.

    ...more

    Fake Pokémon Go app on Google Play infects phones with screenlocker

    Published: 2019-03-07 23:46:38

    Popularity: None

    Author: Dan Goodin

    "Pokemon Go Ultimate" requires battery removal or Device Manager to be uninstalled.

    ...more

    20-year-old Windows bug lets printers install malware—patch now

    Published: 2019-03-07 23:46:26

    Popularity: None

    Author: Dan Goodin

    Critical vulnerability in all versions opens users to printer watering hole attacks.

    ...more

    Snowden designs device to warn when an iPhone is ratting out users

    Published: 2019-03-07 23:45:23

    Popularity: None

    Author: Dan Goodin

    "Introspection Engine" might one day work with wide variety of smartphones.

    ...more

    Malicious computers caught snooping on Tor-anonymized Dark Web sites

    Published: 2019-03-07 23:45:17

    Popularity: None

    Author: Dan Goodin

    Misbehaving hidden service directories are scattered around the world.

    ...more

    New attack steals SSNs, e-mail addresses, and more from HTTPS pages

    Published: 2019-03-07 23:41:50

    Popularity: None

    Author: Dan Goodin

    Approach exploits how HTTPS responses are delivered over transmission control protocol.

    ...more

    New air-gap jumper covertly transmits data in hard-drive sounds

    Published: 2019-03-07 23:41:10

    Popularity: None

    Author: Dan Goodin

    "DiskFiltration" siphons data even when computers are disconnected from the Internet.

    ...more

    Guccifer 2.0 doxes hundreds of House Democrats with massive document dump

    Published: 2019-03-07 23:41:03

    Popularity: None

    Author: Dan Goodin

    Trove includes home and cell phone numbers, e-mail addresses and some home addresses.

    ...more

    Linux bug leaves USA Today, other top sites vulnerable to serious hijacking attacks

    Published: 2019-03-07 23:41:02

    Popularity: None

    Author: Dan Goodin

    "Off-path" attack means hackers can be anywhere with no man-in-the-middle needed.

    ...more

    How the NSA snooped on encrypted Internet traffic for a decade

    Published: 2019-03-07 23:39:57

    Popularity: None

    Author: Dan Goodin

    Exploit against Cisco's PIX line of firewalls remotely extracted crypto keys.

    ...more

    Meet USBee, the malware that uses USB drives to covertly jump airgaps

    Published: 2019-03-07 23:37:40

    Popularity: None

    Author: Dan Goodin

    Technique works on virtually all USB drives with no modifications necessary.

    ...more

    Stealing login credentials from a locked PC or Mac just got easier

    Published: 2019-03-07 23:37:12

    Popularity: None

    Author: Dan Goodin

    20 seconds of physical access with a $50 device is all it takes.

    ...more

    Two critical bugs and more malicious apps make for a bad week for Android

    Published: 2019-03-07 23:37:01

    Popularity: None

    Author: Dan Goodin

    Google releases fixes for newer devices and ejects apps following reports.

    ...more

    Bug that hit Firefox and Tor browsers was hard to spot—now we know why

    Published: 2019-03-07 23:36:16

    Popularity: None

    Author: Dan Goodin

    The curious case of Firefox's (now fixed) certificate pinning failure.

    ...more

    Record-breaking DDoS reportedly delivered by >145k hacked cameras

    Published: 2019-03-07 23:33:40

    Popularity: None

    Author: Dan Goodin

    Once unthinkable, 1 terabit attacks may soon be the new normal.

    ...more

    iPhone exploit bounty surges to an eye-popping $1.5 million

    Published: 2019-03-07 23:33:36

    Popularity: None

    Author: Dan Goodin

    Zerodium triples price for iOS exploits, doubles Android bounties to $200,000.

    ...more

    NSA could put undetectable “trapdoors” in millions of crypto keys

    Published: 2019-03-07 23:32:08

    Popularity: None

    Author: Dan Goodin

    Technique allows attackers to passively decrypt Diffie-Hellman protected data.

    ...more

    “Most serious” Linux privilege-escalation bug ever is under active exploit (updated)

    Published: 2019-03-07 23:31:49

    Popularity: None

    Author: Dan Goodin

    Lurking in the kernel for nine years, flaw gives untrusted users unfettered root access.

    ...more

    New leak may show if you were hacked by the NSA

    Published: 2019-03-07 23:30:19

    Popularity: None

    Author: Dan Goodin

    Shadow Brokers identifies hundreds of organizations it claims were hacked by NSA.

    ...more

    Meet PoisonTap, the $5 tool that ransacks password-protected computers

    Published: 2019-03-07 23:29:36

    Popularity: None

    Author: Dan Goodin

    The perils of leaving computers unattended is about to get worse.

    ...more

    Powerful backdoor/rootkit found preinstalled on 3 million Android phones

    Published: 2019-03-07 23:29:07

    Popularity: None

    Author: Dan Goodin

    Firmware that actively tries to hide itself allows attackers to install apps as root.

    ...more

    At least 10 million Android users imperiled by popular AirDroid app

    Published: 2019-03-07 23:26:46

    Popularity: None

    Author: Dan Goodin

    For six months, the remote management app has opened users to code-execution attacks.

    ...more

    Mozilla and Tor release urgent update for Firefox 0-day under active attack

    Published: 2019-03-07 23:26:45

    Popularity: None

    Author: Dan Goodin

    Critical code-execution flaw resides in Windows, Mac, and Linux. Patch now.

    ...more

    This low-cost device may be the world’s best hope against account takeovers

    Published: 2019-03-07 23:25:36

    Popularity: None

    Author: Dan Goodin

    Privacy-preserving “cryptographic assertions” are impossible to guess or phish.

    ...more

    NSA-leaking Shadow Brokers lob Molotov cocktail before exiting world stage

    Published: 2019-03-07 23:24:01

    Popularity: None

    Author: Dan Goodin

    With 8 days before inauguration of Donald Trump, leak is sure to inflame US officials.

    ...more

    Hackers trigger yet another power outage in Ukraine

    Published: 2019-03-07 23:23:52

    Popularity: None

    Author: Dan Goodin

    For the second year in a row, hack targets Ukraine during one of its coldest months.

    ...more

    Widely used WebEx plugin for Chrome will execute attack code—patch now!

    Published: 2019-03-07 23:21:09

    Popularity: None

    Author: Dan Goodin

    Publicly known “magic string” lets any site run malicious code, no questions asked.

    ...more

    Virulent Android malware returns, gets >2 million downloads on Google Play

    Published: 2019-03-07 23:21:08

    Popularity: None

    Author: Dan Goodin

    HummingWhale is back with new tricks, including a way to gin user ratings.

    ...more

    Former NSA contractor may have stolen 75% of TAO’s elite hacking tools

    Published: 2019-03-07 23:20:49

    Popularity: None

    Author: Dan Goodin

    Prosecutors reportedly plan to charge Harold T. Martin with espionage.

    ...more

    Now sites can fingerprint you online even when you use multiple browsers

    Published: 2019-03-07 23:20:48

    Popularity: None

    Author: Dan Goodin

    Online tracking gets more accurate and harder to evade.

    ...more

    Researchers find “severe” flaw in WordPress plugin with 1 million installs

    Published: 2019-03-07 23:20:29

    Popularity: None

    Author: Dan Goodin

    If you use NextGEN Gallery, now would be a good time to update.

    ...more

    Google reports “high-severity” bug in Edge/IE, no patch available

    Published: 2019-03-07 23:20:28

    Popularity: None

    Author: Dan Goodin

    String of unpatched security flaws comes after February Patch Tuesday was canceled.

    ...more

    Hackers who took control of PC microphones siphon >600 GB from 70 targets

    Published: 2019-03-07 23:19:52

    Popularity: None

    Author: Dan Goodin

    Critical infrastructure, media, and scientists targeted by suspected nation-state.

    ...more

    New ASLR-busting JavaScript is about to make drive-by exploits much nastier

    Published: 2019-03-07 23:19:23

    Popularity: None

    Author: Dan Goodin

    A property found in virtually all modern CPUs neuters decade-old security protection.

    ...more

    Hacks all the time. Engineers recently found Yahoo systems remained compromised

    Published: 2019-03-07 23:19:17

    Popularity: None

    Author: Dan Goodin

    Company knocks $350 million off its purchase price.

    ...more

    New Mac malware pinned on same Russian group blamed for election hacks

    Published: 2019-03-07 23:18:43

    Popularity: None

    Author: Dan Goodin

    Xagent for Macs steals passwords, grabs screenshots, and exfiltrates iPhone backups.

    ...more

    At death’s door for years, widely used SHA1 function is now dead

    Published: 2019-03-07 23:17:39

    Popularity: None

    Author: Dan Goodin

    Algorithm underpinning Internet security falls to first-known collision attack.

    ...more

    Android crypto blunder exposes users to highly privileged malware

    Published: 2019-03-07 23:16:59

    Popularity: None

    Author: Dan Goodin

    "Fake ID" exploits work because Android doesn't properly inspect certificates.

    ...more

    This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”

    Published: 2019-03-07 23:16:41

    Popularity: None

    Author: Dan Goodin

    Researchers devise stealthy attack that reprograms USB device firmware.

    ...more

    Google unveils independent “fork” of OpenSSL called “BoringSSL”

    Published: 2019-03-07 23:14:29

    Popularity: None

    Author: Dan Goodin

    Stripped down package means there will be three independent versions of OpenSSL.

    ...more

    Bitcoin security guarantee shattered by anonymous miner with 51% network power

    Published: 2019-03-07 23:14:20

    Popularity: None

    Author: Dan Goodin

    In a first, one player got a monopoly of Bitcoin's total computational power.

    ...more

    Root backdoor found in surveillance gear used by law enforcement

    Published: 2019-03-07 23:13:52

    Popularity: None

    Author: Dan Goodin

    Vulnerability one of nine critical weaknesses from lawful intercept provider.

    ...more

    Secret keys stashed in Google Play apps pose risk to Android users, developers

    Published: 2019-03-07 23:13:27

    Popularity: None

    Author: Dan Goodin

    Google Play crawler uncovers secret tokens to Facebook, Twitter, and AWS.

    ...more

    Linux gets fix for flaw that threatens security of shared Web hosts

    Published: 2019-03-07 23:13:03

    Popularity: None

    Author: Dan Goodin

    Privilege escalation bug lets untrusted users wrest control of vulnerable systems.

    ...more

    Reported Paris Hilton hacker cops to new intrusions targeting police

    Published: 2019-03-07 23:12:47

    Popularity: None

    Author: Dan Goodin

    Two-year hacking spree ransacked e-mail account belonging to chief of police.

    ...more

    Still reeling from Heartbleed, OpenSSL suffers from crypto bypass flaw

    Published: 2019-03-07 23:12:40

    Popularity: None

    Author: Dan Goodin

    Bug in crypto library strips away one of the Internet's most crucial protections.

    ...more

    Critical vulnerability under “massive” attack imperils high-impact sites [Updated]

    Published: 2019-03-07 23:11:57

    Popularity: None

    Author: Dan Goodin

    Exploits for easy-to-spot bug are trivial, reliable, and publicly available.

    ...more

    Mike Pence used an AOL e-mail account for state business and it got hacked

    Published: 2019-03-07 23:11:32

    Popularity: None

    Author: Dan Goodin

    As a candidate, Trump VP castigated Clinton for use of a private e-mail server.

    ...more

    In-the-wild exploits ramp up against high-impact sites using Apache Struts

    Published: 2019-03-07 23:11:00

    Popularity: None

    Author: Dan Goodin

    Hackers are still exploiting the bug to install malware on high-impact sites.

    ...more

    Firefox gets complaint for labeling unencrypted login page insecure

    Published: 2019-03-07 23:10:50

    Popularity: None

    Author: Dan Goodin

    Sorry! That’s a feature not a bug.

    ...more

    Google takes Symantec to the woodshed for mis-issuing 30,000 HTTPS certs [updated]

    Published: 2019-03-07 23:09:52

    Popularity: None

    Author: Dan Goodin

    Chrome to immediately stop recognizing EV status and gradually nullify all certs.

    ...more

    Shielding MAC addresses from stalkers is hard and Android fails miserably at it

    Published: 2019-03-07 23:09:30

    Popularity: None

    Author: Dan Goodin

    Only an estimated 6% of Android phones randomize MACs, and they do it poorly.

    ...more

    Smart TV hack embeds attack code into broadcast signal—no access required

    Published: 2019-03-07 23:07:52

    Popularity: None

    Author: Dan Goodin

    Demo exploit is inexpensive, remote, scalable—and opens door to more advanced hacks.

    ...more

    Rash of in-the-wild attacks permanently destroys poorly secured IoT devices

    Published: 2019-03-07 23:07:21

    Popularity: None

    Author: Dan Goodin

    Ongoing "BrickerBot" attacks might be trying to kill devices before they can join a botnet.

    ...more

    Found in the wild: Vault7 hacking tools WikiLeaks says come from CIA

    Published: 2019-03-07 23:07:10

    Popularity: None

    Author: Dan Goodin

    WikiLeaks dump identical to operation that has been hacking governments since 2011.

    ...more

    Mysterious Microsoft patch killed 0-days released by NSA-leaking Shadow Brokers

    Published: 2019-03-07 23:06:51

    Popularity: None

    Author: Dan Goodin

    Microsoft fixed critical vulnerabilities in uncredited update released in March.

    ...more

    Meet Greyhound.com, the site that doesn’t allow password changes

    Published: 2019-03-07 23:05:15

    Popularity: None

    Author: Dan Goodin

    Greyhound allows four-digit PINs and stores them in plaintext.

    ...more

    Thieves drain 2fa-protected bank accounts by abusing SS7 routing protocol

    Published: 2019-03-07 23:04:08

    Popularity: None

    Author: Dan Goodin

    The same weakness could be used to eavesdrop on calls and track users’ locations.

    ...more

    Two days after WCry worm, Microsoft decries exploit stockpiling by governments

    Published: 2019-03-07 23:03:09

    Popularity: None

    Author: Dan Goodin

    Company president specifically notes role of NSA code used by Ransomware worm.

    ...more

    “Yahoobleed” flaw leaked private e-mail attachments and credentials

    Published: 2019-03-07 23:01:59

    Popularity: None

    Author: Dan Goodin

    Yahoo promptly retired ImageMagic library after failing to install 2-year-old patch.

    ...more

    Advanced CIA firmware has been infecting Wi-Fi routers for years

    Published: 2019-03-07 23:00:11

    Popularity: None

    Author: Dan Goodin

    Latest Vault7 release exposes network-spying operation CIA kept secret since 2007.

    ...more

    This Windows Defender bug was so gaping its PoC exploit had to be encrypted

    Published: 2019-03-07 22:59:57

    Popularity: None

    Author: Dan Goodin

    Is there a fuzzer in the house?

    ...more

    After phishing attacks, Chrome extensions push adware to millions

    Published: 2019-03-07 22:54:32

    Popularity: None

    Author: Dan Goodin

    Compromised accounts push fraudulent extension updates to unsuspecting users.

    ...more

    Russian group that hacked DNC used NSA attack code in attack on hotels

    Published: 2019-03-07 22:54:29

    Popularity: None

    Author: Dan Goodin

    Fancy Bear used Eternal Blue 3 months after it was leaked by a mysterious group.

    ...more

    Critical Tor flaw leaks users’ real IP address—update now

    Published: 2019-03-07 22:44:16

    Popularity: None

    Author: Dan Goodin

    TorMoil threatens Mac and Linux versions of Tor browser; Windows and Tails not affected.

    ...more

    Top-selling handgun safe can be remotely opened in seconds—no PIN needed

    Published: 2019-03-07 22:39:35

    Popularity: None

    Author: Dan Goodin

    There's no online update mechanism for defective electronic safe.

    ...more

    Mastermind behind sophisticated, massive botnet outs himself

    Published: 2019-03-07 22:39:29

    Popularity: None

    Author: Dan Goodin

    Andromeda kingpin is identified by his ICQ number.

    ...more

    Hackers hit key ATM network in crime spree that clears $10 million

    Published: 2019-03-07 22:39:26

    Popularity: None

    Author: Dan Goodin

    Previously undetected MoneyTaker gang is likely to strike again.

    ...more

    Hackers hit key ATM network in crime spree that clears $10 million

    Published: 2019-03-07 22:39:24

    Popularity: None

    Author: Dan Goodin

    Previously undetected MoneyTaker gang is likely to strike again.

    ...more

    Nope, this isn’t the HTTPS-validated Stripe website you think it is

    Published: 2019-03-07 22:39:09

    Popularity: None

    Author: Dan Goodin

    How extended validation certificates can be used to scam, not help, end users.

    ...more

    BitTorrent users beware: Flaw lets hackers control your computer

    Published: 2019-03-07 22:35:10

    Popularity: None

    Author: Dan Goodin

    “Low complexity” hack for Transmission client may work against other clients, too.

    ...more

    Found: New Android malware with never-before-seen spying capabilities

    Published: 2019-03-07 22:34:59

    Popularity: None

    Author: Dan Goodin

    Skygofree is among the most powerful spy platforms ever created for Android.

    ...more

    Google Chrome extensions with 500,000 downloads found to be malicious

    Published: 2019-03-07 22:34:55

    Popularity: None

    Author: Dan Goodin

    Google removes four extensions that used infected computers in click fraud scheme.

    ...more

    An Adobe Flash 0day is being actively exploited in the wild

    Published: 2019-03-07 22:32:23

    Popularity: None

    Author: Dan Goodin

    Adobe plans to have a fix for the critical flaw next week.

    ...more

    Tesla cloud resources are hacked to run cryptocurrency-mining malware

    Published: 2019-03-07 22:30:33

    Popularity: None

    Author: Dan Goodin

    Crooks find poorly secured access credentials, use them to install stealth miner.

    ...more

    Developer gets prison after admitting backdoor was made for malice

    Published: 2019-03-07 22:29:59

    Popularity: None

    Author: Dan Goodin

    Full-featured trojan catered to password thieves, Peeping Toms, and ransomware scammers.

    ...more

    23,000 HTTPS certificates axed after CEO emails private keys

    Published: 2019-03-07 22:29:41

    Popularity: None

    Author: Dan Goodin

    Flap that goes public renews troubling questions about issuance of certificates.

    ...more

    “Drupalgeddon2” touches off arms race to mass-exploit powerful Web servers

    Published: 2019-03-07 22:25:19

    Popularity: None

    Author: Dan Goodin

    Bug patched in March is still being exploited to take full control of servers.

    ...more

    Suspicious event hijacks Amazon traffic for 2 hours, steals cryptocurrency

    Published: 2019-03-07 22:24:59

    Popularity: None

    Author: Dan Goodin

    Almost 1,300 addresses for Amazon Route 53 rerouted for two hours.

    ...more

    Drive-by Rowhammer attack uses GPU to compromise an Android phone

    Published: 2019-03-07 22:23:18

    Popularity: None

    Author: Dan Goodin

    JavaScript based GLitch pwns browsers by flipping bits inside memory chips.

    ...more

    Packets over a LAN are all it takes to trigger serious Rowhammer bit flips

    Published: 2019-03-07 22:22:36

    Popularity: None

    Author: Dan Goodin

    The bar for exploiting potentially serious DDR weakness keeps getting lower.

    ...more

    Website leaked real-time location of most US cell phones to almost anyone

    Published: 2019-03-07 22:21:38

    Popularity: None

    Author: Dan Goodin

    Easily found bug in free demo let visitors track phones from four top US carriers.

    ...more

    Hackers infect 500,000 consumer routers all over the world with malware

    Published: 2019-03-07 22:21:29

    Popularity: None

    Author: Dan Goodin

    VPNFilter can survive reboots and contains destructive "kill" function.

    ...more

    Chrome and Firefox leaks let sites steal visitors’ Facebook names, profile pics

    Published: 2019-03-07 22:20:00

    Popularity: None

    Author: Dan Goodin

    Cutting-edge hack exploited newly added graphics feature until it was patched.

    ...more

    A host of new security enhancements is coming to iOS and macOS

    Published: 2019-03-07 22:19:45

    Popularity: None

    Author: Dan Goodin

    Coming: FaceTime encryption, protected cam access, and, possibly, USB Restricted Mode.

    ...more

    Backdoored images downloaded 5 million times finally removed from Docker Hub

    Published: 2019-03-07 22:18:43

    Popularity: None

    Author: Dan Goodin

    17 images posted by a single account over 10 months may have generated $90,000.

    ...more

    Decades-old PGP bug allowed hackers to spoof just about anyone’s signature

    Published: 2019-03-07 22:18:37

    Popularity: None

    Author: Dan Goodin

    SigSpoof flaw fixed in GnuPG, Enigmail, GPGTools, and python-gnupg.

    ...more

    Stolen certificates from D-Link used to sign password-stealing malware

    Published: 2019-03-07 22:16:50

    Popularity: None

    Author: Dan Goodin

    This isn't the IP camera software you think it is.

    ...more

    Meet Helm, the startup taking on Gmail with a server that runs in your home

    Published: 2019-03-07 22:07:43

    Popularity: None

    Author: Dan Goodin

    Fee-based service couples the security of a private server with the reliability of the cloud.

    ...more

    New Signal privacy feature removes sender ID from metadata

    Published: 2019-03-07 22:06:28

    Popularity: None

    Author: Dan Goodin

    Just-announced beta seals sender details inside encrypted envelope.

    ...more

    Intel CPUs fall to new hyperthreading exploit that pilfers crypto keys

    Published: 2019-03-07 22:05:57

    Popularity: None

    Author: Dan Goodin

    Side-channel leak in Skylake and Kaby Lake chips probably affects AMD CPUs, too.

    ...more

    Google goes down after major BGP mishap routes traffic through China

    Published: 2019-03-07 22:05:28

    Popularity: None

    Author: Dan Goodin

    Google says it doesn't believe leak was malicious despite suspicious appearances.

    ...more

    Mass router hack exposes millions of devices to potent NSA exploit

    Published: 2019-03-07 22:04:07

    Popularity: None

    Author: Dan Goodin

    Years-old UPnP vulnerability being used to expose ports 139 and 445.

    ...more

    If you installed PEAR PHP in the last 6 months, you may be infected

    Published: 2019-03-07 21:59:02

    Popularity: None

    Author: Dan Goodin

    Pear.php.net shuts down after maintainers discover serious supply-chain attack.

    ...more

    Microsoft patches 0-day vulnerabilities in IE and Exchange

    Published: 2019-03-07 21:57:31

    Popularity: None

    Author: Dan Goodin

    IE info bug was under active exploit; exploit code for Exchange flaw was circulating.

    ...more

    Linux maintainers were infected for 2 years by SSH-dwelling backdoor with huge reach

    Published: 2024-05-18 12:29:43

    Popularity: None

    Author: Dan Goodin

    LLM Says: "Backdoored ssh"

    Ebury backdoors SSH servers in hosting providers, giving the malware extraordinary reach.

    ...more

    Linux maintainers were infected for 2 years by SSH-dwelling backdoor with huge reach

    Published: 2024-05-21 23:02:11

    Popularity: None

    Author: Dan Goodin

    LLM Says: "backdoored ssh"

    Ebury backdoors SSH servers in hosting providers, giving the malware extraordinary reach.

    ...more

    end