Automation is making attacks on open source code repositories harder to fight.
...moreTotal Articles Found: 245
Top sources:
Top Keywords:
Top Authors
Top Articles:
Published: 2024-04-01 00:36:06
Popularity: None
Author: Dan Goodin
Automation is making attacks on open source code repositories harder to fight.
...morePublished: 2024-03-16 00:17:24
Popularity: 118
Author: Dan Goodin
Keywords:
LLMs are trained to block harmful responses. Old-school images can override those rules.
...morePublished: 2024-02-07 05:13:33
Popularity: None
Author: Dan Goodin
Buffer overflow in bootloader shim allows attackers to run code each time devices boot up.
...morePublished: 2024-01-28 12:59:43
Popularity: None
Author: Dan Goodin
How does a legacy test account grant access to read every Office 365 account?
...morePublished: 2024-01-10 15:09:11
Popularity: None
Author: Dan Goodin
Researchers identify 23 vulnerabilities, some of which can exploited with no authentication.
...morePublished: 2023-12-19 20:41:24
Popularity: None
Author: Dan Goodin
Novel Terrapin attack uses prefix truncation to downgrade the security of SSH channels.
...morePublished: 2023-11-15 13:35:42
Popularity: None
Author: Dan Goodin
Among other things, bug allows code running inside a VM to crash hypervisors.
...morePublished: 2023-11-14 23:16:40
Popularity: None
Author: Dan Goodin
An error as small as a single flipped memory bit is all it takes to expose a private key.
...morePublished: 2023-11-14 19:31:29
Popularity: None
Author: Dan Goodin
An error as small as a single flipped memory bit is all it takes to expose a private key.
...morePublished: 2023-11-07 20:30:07
Popularity: None
Author: Dan Goodin
Atlassian's senior management is all but begging customers to take immediate action.
...morePublished: 2023-10-27 16:28:15
Popularity: None
Author: Dan Goodin
New technique produces lots of bitflips and could one day help form an attack.
...morePublished: 2023-10-27 12:03:47
Popularity: None
Author: Dan Goodin
New technique produces lots of bitflips and could one day help form an attack.
...morePublished: 2023-10-25 17:00:39
Popularity: 157
Author: Dan Goodin
Keywords:
iLeakage is practical and requires minimal resources. A patch isn't (yet) available.
...morePublished: 2023-09-27 16:06:32
Popularity: None
Author: Dan Goodin
A previously unknown compression side channel in GPUs can expose images thought to be private.
...morePublished: 2023-09-13 16:33:57
Popularity: None
Author: Dan Goodin
It's not too late to check if a Linux device you use was targeted.
...morePublished: 2023-05-17 03:45:51
Popularity: None
Author: Dan Goodin
With no easy way to revoke compromised keys, MSI, and its customers, are in a real pickle.
...morePublished: 2023-03-17 20:26:26
Popularity: 336
Author: Dan Goodin
Keywords:
If your device runs Exynos chips, be very, very concerned.
...morePublished: 2023-02-28 01:01:59
Popularity: 3866
Author: Dan Goodin
Keywords:
Already smarting from a breach that stole customer vaults, LastPass has more bad news.
...morePublished: 2022-10-28 18:41:57
Popularity: 7
Author: Dan Goodin
Keywords:
NSX-V appliance, which VMware no longer supports, also affected and patched.
...morePublished: 2022-09-28 16:00:27
Popularity: 17
Author: Dan Goodin
Keywords:
Previously overlooked flaws allow malicious homeservers to decrypt and spoof messages.
...morePublished: 2022-09-20 21:22:34
Popularity: 400
Author: Dan Goodin
Keywords:
"Astonishing failures" over a 5-year span.
...moreWith polymorphic encoding and a multistage infection chain, Shikitega is hard to detect.
...moreAlready regarded among the most advanced, the attacks were also done at a massive scale.
...moreGroup that pulled off successful attack on PyPI has humble origins.
...morePublished: 2022-07-19 20:13:27
Popularity: 66
Author: Dan Goodin
Keywords:
China-based Micodus has yet to patch critical vulnerabilities in MV720 GPS tracker.
...morePublished: 2022-07-12 16:00:03
Popularity: 291
Author: Dan Goodin
Keywords:
Both companies are rolling out mitigations, but they add overhead of 12 to 28 percent.
...morePublished: 2022-05-26 00:10:27
Popularity: 58
Author: Dan Goodin
Keywords:
If you're machine failed to get them automatically, you're not alone.
...morePublished: 2022-04-20 19:28:17
Popularity: 171
Author: Dan Goodin
Keywords:
A failure to sanity check signatures for division-by-zero flaws makes forgeries easy.
...moreSilently fixed authentication bypass remained a secret even after it was under attack.
...morePublished: 2022-02-17 23:31:35
Popularity: 54
Author: Dan Goodin
Keywords:
TunnelVision group exploit the critical flaw to infect targets with ransomware.
...morePublished: 2021-07-09 22:30:14
Popularity: 22
Author: Dan Goodin
Keywords:
Data allegedly sold individually or through weekly or monthly subscriptions.
...morePublished: 2021-07-08 10:55:17
Popularity: None
Author: Dan Goodin
Game-over code-execution attacks are still possible even after fix is installed.
...morePublished: 2021-06-21 21:02:23
Popularity: 37
Author: Dan Goodin
Keywords:
The world's most secure consumer OS is bitten by a garden-variety programming bug.
...morePublished: 2021-05-04 19:07:56
Popularity: 299
Author: Dan Goodin
Keywords:
A new transient execution variant is the first exploit micro-ops caches.
...morePublished: 2021-04-21 19:30:08
Popularity: 3439
Author: Dan Goodin
Keywords:
Widely used forensic software can be exploited to infect investigators' computers.
...moreMicrosoft-owned Github pulls down proof-of-concept code posted by researcher.
...morePublished: 2021-01-05 21:40:31
Popularity: 633
Author: Dan Goodin
Keywords:
Messenger maker has expressed no plans to fix location disclosure flaw.
...morePublished: 2020-10-05 23:54:44
Popularity: None
Author: Dan Goodin
Attackers are going to great lengths to gain the highest level of persistence.
...morePublished: 2020-09-18 11:48:26
Popularity: 265
Author: Dan Goodin
Keywords:
Behold: The useful and not-so-useful privacy features you've been waiting for.
...morePublished: 2020-07-23 02:27:18
Popularity: 36
Author: Dan Goodin
Keywords:
Hack also exposed phone numbers, email addresses, and other PI for 130 users.
...morePublished: 2020-06-16 21:06:36
Popularity: 976
Author: Dan Goodin
Keywords:
Vault 7, the worst data theft in CIA history, could have been avoided, report finds.
...moreCritics say everyone deserves it. Others say safety should be factored in, too.
...morePublished: 2020-04-14 17:30:20
Popularity: 2326
Author: Dan Goodin
Keywords:
Manufacturer says conversion requires “significant rework.” Airbreak suggests otherwise.
...moreJust when you thought it was secure again, Intel's digital vault falls to a new attack.
...morePublished: 2020-01-30 21:15:49
Popularity: None
Author: Dan Goodin
Keywords:
Firefox ousts almost 200 add-ons while Google detects a significant increase in abuse.
...morePublished: 2020-01-09 16:28:00
Popularity: None
Author: Dan Goodin
Flaw allows attackers to access sensitive memory locations that are normally off-limits.
...morePublished: 2020-01-08 14:43:32
Popularity: None
Author: Dan Goodin
Behold: the world's first known chosen-prefix collision of widely used hash function.
...morePublished: 2019-10-30 19:05:04
Popularity: 269
Author: Dan Goodin
Keywords:
Deletions come after allegations NSO exploit targeted 1,400 WhatsApp users.
...morePublished: 2019-09-29 02:38:59
Popularity: None
Author: Dan Goodin
Unpatchable vulnerability is a game-changer that even Apple will be unable to stop.
...morePublished: 2019-09-06 22:22:13
Popularity: None
Author: Dan Goodin
Google has so far remained mum on the flaw, which affects fully patched devices.
...morePublished: 2019-06-16 14:25:09
Popularity: None
Author: Dan Goodin
RAMBleed side-channel attack works even when DRAM is protected by error-correcting code.
...morePublished: 2019-06-06 20:47:20
Popularity: None
Author: Dan Goodin
Keywords:
After Google successfully beat back Triada in 2017, its developers found a new way in.
...morePublished: 2019-06-04 19:20:02
Popularity: None
Author: Dan Goodin
Keywords:
Carefully concealed plugin bombarded users with ads during inopportune times.
...morePublished: 2019-05-29 23:05:00
Popularity: None
Author: Dan Goodin
Keywords:
If you're seeing more malicious redirects than usual, now you know why.
...morePublished: 2019-05-25 12:45:57
Popularity: None
Author: Dan Goodin
Keywords:
WalletGenerator.net and the mystery of the backdoored random number generator.
...morePublished: 2019-05-18 11:45:24
Popularity: 1565
Author: Dan Goodin
Keywords:
Linksys said it fixed flaw in 2014. Researcher Troy Mursch disagrees.
...morePublished: 2019-05-23 00:41:04
Popularity: None
Author: Dan Goodin
Keywords:
SandboxEscaper has published 7 such exploits to date, 3 in the past 24 hours.
...morePublished: 2019-05-07 06:14:49
Popularity: 1033
Author: Dan Goodin
Keywords:
Already criticized for not protecting its exploit arsenal, the NSA has a new lapse.
...morePublished: 2019-04-30 19:50:10
Popularity: 953
Author: Dan Goodin
Keywords:
High-severity hole in Oracle WebLogic under active exploit for 9 days. Patch now.
...morePublished: 2019-04-19 12:20:14
Popularity: 360
Author: Dan Goodin
Keywords:
Permissions that Edge added to downloaded files break important security feature.
...morePublished: 2019-04-19 22:38:45
Popularity: 512
Author: Dan Goodin
Keywords:
Hutchins once proclaimed his innocence. Now he admits he created the Kronos bank trojan.
...morePublished: 2019-04-17 15:00:58
Popularity: 822
Author: Dan Goodin
Keywords:
Despite widespread attention since January, DNS campaign shows no signs of abating.
...morePublished: 2019-03-13 19:51:34
Popularity: 310
Author: Dan Goodin
Keywords:
Google removes 210 apps after outside researchers report them as abusive.
...morePublished: 2019-03-12 21:26:24
Popularity: 310
Author: Dan Goodin
Keywords:
Certificates with 63-bit serial numbers touch off mass revocation blitz.
...morePublished: 2019-03-08 23:30:05
Popularity: 497
Author: Dan Goodin
Keywords:
FBI says hackers gained unauthorized access by exploiting weak passwords.
...morePublished: 2019-03-11 22:40:38
Popularity: 47
Author: Dan Goodin
Keywords:
Phone-based scam may be low-tech, but it netted big bucks, prosecutors say.
...morePublished: 2019-03-08 02:02:29
Popularity: 895
Author: Dan Goodin
Keywords:
Unpatched flaw used in combination with Chrome exploit doesn't work against Win 10.
...morePublished: 2019-03-08 00:55:00
Popularity: None
Author: Dan Goodin
Technique discovered in June requires nothing more than spoofing a cookie.
...morePublished: 2019-03-08 00:54:55
Popularity: None
Author: Dan Goodin
Bug in open source analytics app may have compromised other services, too.
...morePublished: 2019-03-08 00:52:19
Popularity: None
Author: Dan Goodin
Google Play crawler uncovers secret tokens to Facebook, Twitter, and AWS.
...morePublished: 2019-03-08 00:50:40
Popularity: None
Author: Dan Goodin
TrueCrypt developer withholds permission, suggests "starting from scratch."
...morePublished: 2019-03-08 00:50:29
Popularity: None
Author: Dan Goodin
DIY guide provides instructions for carrying out similar muckraking exploits.
...morePublished: 2019-03-08 00:49:38
Popularity: None
Author: Dan Goodin
Open source code also attacks devices connecting to wireless networks.
...morePublished: 2019-03-08 00:49:36
Popularity: None
Author: Dan Goodin
Bug in Android KeyStore that leaks credentials fixed only in KitKat.
...morePublished: 2019-03-08 00:48:57
Popularity: None
Author: Dan Goodin
In a first, one player got a monopoly of Bitcoin's total computational power.
...morePublished: 2019-03-08 00:47:12
Popularity: None
Author: Dan Goodin
Vulnerability one of nine critical weaknesses from lawful intercept provider.
...morePublished: 2019-03-08 00:46:38
Popularity: None
Author: Dan Goodin
Privilege escalation bug lets untrusted users wrest control of vulnerable systems.
...morePublished: 2019-03-08 00:44:38
Popularity: None
Author: Dan Goodin
Open source tool tests connections for crypto flaws.
...morePublished: 2019-03-08 00:43:34
Popularity: None
Author: Dan Goodin
Two-year hacking spree ransacked e-mail account belonging to chief of police.
...morePublished: 2019-03-08 00:41:37
Popularity: None
Author: Dan Goodin
Bug in crypto library strips away one of the Internet's most crucial protections.
...morePublished: 2019-03-08 00:37:59
Popularity: None
Author: Dan Goodin
Researchers devise stealthy attack that reprograms USB device firmware.
...morePublished: 2019-03-08 00:37:56
Popularity: None
Author: Dan Goodin
Adoption of poorly secured password managers opens a single point of failure.
...morePublished: 2019-03-08 00:37:54
Popularity: None
Author: Dan Goodin
Legitimate users caught in legal fire designed to take down botnets.
...morePublished: 2019-03-08 00:37:18
Popularity: None
Author: Dan Goodin
"Fake ID" exploits work because Android doesn't properly inspect certificates.
...morePublished: 2019-03-08 00:36:12
Popularity: None
Author: Dan Goodin
Stripped down package means there will be three independent versions of OpenSSL.
...morePublished: 2019-03-08 00:35:47
Popularity: None
Author: Dan Goodin
Attack targeted "Tor hidden services" used to protect IDs of website operators.
...morePublished: 2019-03-08 00:32:13
Popularity: None
Author: Dan Goodin
"Masque attack" could expose banking data, e-mails, and other sensitive data.
...morePublished: 2019-03-08 00:31:44
Popularity: None
Author: Dan Goodin
Attacks tied to gang that previously infected governments with highly advanced malware.
...morePublished: 2019-03-08 00:31:40
Popularity: None
Author: Dan Goodin
Microsoft phone coughs up cookies, but full compromise fails.
...morePublished: 2019-03-08 00:31:37
Popularity: None
Author: Dan Goodin
Near field communication exploits play starring role in hacking competition.
...morePublished: 2019-03-08 00:29:25
Popularity: None
Author: Dan Goodin
Bringing big database-driven sites to their knees just got a little easier.
...morePublished: 2019-03-08 00:29:18
Popularity: None
Author: Dan Goodin
Operation Torpedo relied on long-abandoned Metasploit Decloaking Engine.
...morePublished: 2019-03-08 00:28:22
Popularity: None
Author: Dan Goodin
Thunderstrike allows anyone with even brief access to install stealthy malware.
...morePublished: 2019-03-08 00:26:54
Popularity: None
Author: Dan Goodin
New bug haunting Linux could spark "a lot of collateral damage on the Internet."
...morePublished: 2019-03-08 00:26:38
Popularity: None
Author: Dan Goodin
"After a week, you might start to feel there is something wrong with your device."
...morePublished: 2019-03-08 00:26:02
Popularity: None
Author: Dan Goodin
"Equation Group" ran the most advanced hacking operation ever uncovered.
...morePublished: 2019-03-08 00:25:58
Popularity: None
Author: Dan Goodin
Mystery solved after crackers find Arabic word that dogged Kaspersky for weeks.
...morePublished: 2019-03-08 00:22:58
Popularity: None
Author: Dan Goodin
Two-year-old bug exposes thousands of servers to crippling attack.
...morePublished: 2019-03-08 00:22:56
Popularity: None
Author: Dan Goodin
Netflix move leaves Amazon as the most visible no-show to the Web crypto party.
...morePublished: 2019-03-08 00:22:15
Popularity: None
Author: Dan Goodin
Attack code exploiting virtualization flaw could be available soon, researcher says.
...morePublished: 2019-03-08 00:21:05
Popularity: None
Author: Dan Goodin
An estimated 630 million phones fail to purge contacts, e-mails, images, and more.
...morePublished: 2019-03-08 00:21:00
Popularity: None
Author: Dan Goodin
Diffie-Hellman downgrade weakness allows attackers to intercept encrypted data.
...morePublished: 2019-03-08 00:19:51
Popularity: None
Author: Dan Goodin
A comedy of programming errors could prove catastrophic for affected users.
...morePublished: 2019-03-08 00:19:42
Popularity: None
Author: Dan Goodin
Newly discovered iOS bug triggers wave of text messages that causes iDevice reboot.
...morePublished: 2019-03-08 00:17:47
Popularity: None
Author: Dan Goodin
Users: Change your master password and enable 2-factor authentication immediately.
...morePublished: 2019-03-08 00:17:41
Popularity: None
Author: Dan Goodin
Researchers sneak password-stealing app into Apple Store to demonstrate threat.
...morePublished: 2019-03-08 00:16:39
Popularity: None
Author: Dan Goodin
Hijacking was initiated after Italian Police lost control of infected machines.
...morePublished: 2019-03-08 00:16:13
Popularity: None
Author: Dan Goodin
Incident proves buyers' can't be vetted for human rights and ethics, CEO says.
...morePublished: 2019-03-08 00:15:46
Popularity: None
Author: Dan Goodin
Invoices purport to show Hacking Team doing business in Sudan and other rogue nations.
...morePublished: 2019-03-08 00:15:29
Popularity: None
Author: Dan Goodin
Latest critical bug in widely used DNS server underscores its fragility.
...morePublished: 2019-03-08 00:15:23
Popularity: None
Author: Dan Goodin
Deanonymization requires luck but nonetheless shows limits of Tor privacy.
...morePublished: 2019-03-08 00:15:12
Popularity: None
Author: Dan Goodin
Researchers perfect technique that profiles people based on unique keystroke traits.
...morePublished: 2019-03-08 00:15:05
Popularity: None
Author: Dan Goodin
Hacking Team code is the most professionally developed Android malware ever exposed.
...morePublished: 2019-03-08 00:14:14
Popularity: None
Author: Dan Goodin
No, electronicfrontierfoundation.org is not the EFF site you're looking for.
...morePublished: 2019-03-08 00:14:13
Popularity: None
Author: Dan Goodin
Noel Biderman steps down less than a week after gigabytes of his e-mail go public.
...morePublished: 2019-03-08 00:14:12
Popularity: None
Author: Dan Goodin
Vulnerability in open BitTorrent protocol amplified attacks as much as 120 times.
...morePublished: 2019-03-08 00:14:09
Popularity: None
Author: Dan Goodin
Agora dark market suspends operations after finding "suspicious activity."
...morePublished: 2019-03-08 00:13:25
Popularity: None
Author: Dan Goodin
Technique lets rogue apps ask for keychain access, then click OK.
...morePublished: 2019-03-08 00:13:22
Popularity: None
Author: Dan Goodin
Despite its ubiquity, Internet of Things security still isn't ready for prime time.
...morePublished: 2019-03-08 00:12:40
Popularity: None
Author: Dan Goodin
Top picks were . . . drum roll: "123456," "12345," "password," and "DEFAULT."
...morePublished: 2019-03-08 00:12:34
Popularity: None
Author: Dan Goodin
Infected owners must choose between paying $500 and performing factory reset.
...morePublished: 2019-03-08 00:12:30
Popularity: None
Author: Dan Goodin
Piggyback hack allowed Turla gang to conceal location of control servers.
...morePublished: 2019-03-08 00:12:19
Popularity: None
Author: Dan Goodin
Exploiting RSA implementation flaw allows attackers to impersonate HTTPS sites.
...morePublished: 2019-03-08 00:11:06
Popularity: None
Author: Dan Goodin
No, address randomization defense does not protect against stagefright exploits.
...morePublished: 2019-03-08 00:10:57
Popularity: None
Author: Dan Goodin
Lockscreen bug is fixed in latest Android build, but availability is spotty.
...morePublished: 2019-03-08 00:10:33
Popularity: None
Author: Dan Goodin
Unauthorized credential was trusted by all browsers, but Google never authorized it.
...morePublished: 2019-03-08 00:10:32
Popularity: None
Author: Dan Goodin
Outbreak may have caused hundreds of millions of people to download malicious apps.
...morePublished: 2019-03-08 00:09:39
Popularity: None
Author: Dan Goodin
Backdoor in Outlook Web Application operates inside target's firewall.
...morePublished: 2019-03-08 00:09:36
Popularity: None
Author: Dan Goodin
The inclusion of source code and databases suggests breach was extensive.
...morePublished: 2019-03-08 00:09:35
Popularity: None
Author: Dan Goodin
Stagefright 2.0 comes as Android users were still recovering from Stagefright 1.
...morePublished: 2019-03-08 00:09:25
Popularity: None
Author: Dan Goodin
Researchers warn widely used algorithm should be retired sooner.
...morePublished: 2019-03-08 00:08:41
Popularity: None
Author: Dan Goodin
"Factorization as a service" in Amazon cloud is so easy novices can do it.
...morePublished: 2019-03-08 00:07:57
Popularity: None
Author: Dan Goodin
$1,400 device can track users for days with little indication anything is amiss.
...morePublished: 2019-03-08 00:04:59
Popularity: None
Author: Dan Goodin
Privacy advocates warn feds about surreptitious cross-device tracking.
...morePublished: 2019-03-07 23:59:36
Popularity: None
Author: Dan Goodin
Hacked casino operator alleges breach continued while Trustwave was investigating.
...morePublished: 2019-03-07 23:58:54
Popularity: None
Author: Dan Goodin
Electricity Authority computers were paralyzed by attack and are still recovering.
...morePublished: 2019-03-07 23:57:58
Popularity: None
Author: Dan Goodin
World's most widely used Web server often displays geographic locations of Tor sites.
...morePublished: 2019-03-07 23:57:53
Popularity: None
Author: Dan Goodin
OpenSSL maintainers release update that fixes key-recovery bug. Patch now.
...morePublished: 2019-03-07 23:56:58
Popularity: None
Author: Dan Goodin
Researcher-devised exploit threatens Bitcoin wallets and other high-value assets.
...morePublished: 2019-03-07 23:56:55
Popularity: None
Author: Dan Goodin
Low-cost DROWN attack decrypts data in hours, works against TLS e-mail servers, too.
...morePublished: 2019-03-07 23:56:54
Popularity: None
Author: Dan Goodin
Until recently, sample wasn't detected by any of the top antivirus programs.
...morePublished: 2019-03-07 23:56:14
Popularity: None
Author: Dan Goodin
Millions of other phones affected because Android never received 2014 Linux patch.
...morePublished: 2019-03-07 23:56:04
Popularity: None
Author: Dan Goodin
Since 2008, vulnerability has left apps and hardware open to remote hijacking.
...morePublished: 2019-03-07 23:55:56
Popularity: None
Author: Dan Goodin
Major security certification group ignored private warnings for more than 3 days.
...morePublished: 2019-03-07 23:55:28
Popularity: None
Author: Dan Goodin
SS7 routing protocol also exposes locations, contacts, and other sensitive data.
...morePublished: 2019-03-07 23:55:01
Popularity: None
Author: Dan Goodin
Approach relies on already installed code, including widely used glibc library.
...morePublished: 2019-03-07 23:54:37
Popularity: None
Author: Dan Goodin
Padding oracles and memory corruption threats caused by use of older schemes.
...morePublished: 2019-03-07 23:48:48
Popularity: None
Author: Dan Goodin
Malware family packages a large number of exploits that give all-powerful root access.
...morePublished: 2019-03-07 23:46:38
Popularity: None
Author: Dan Goodin
"Pokemon Go Ultimate" requires battery removal or Device Manager to be uninstalled.
...morePublished: 2019-03-07 23:46:26
Popularity: None
Author: Dan Goodin
Critical vulnerability in all versions opens users to printer watering hole attacks.
...morePublished: 2019-03-07 23:45:23
Popularity: None
Author: Dan Goodin
"Introspection Engine" might one day work with wide variety of smartphones.
...morePublished: 2019-03-07 23:45:17
Popularity: None
Author: Dan Goodin
Misbehaving hidden service directories are scattered around the world.
...morePublished: 2019-03-07 23:41:50
Popularity: None
Author: Dan Goodin
Approach exploits how HTTPS responses are delivered over transmission control protocol.
...morePublished: 2019-03-07 23:41:10
Popularity: None
Author: Dan Goodin
"DiskFiltration" siphons data even when computers are disconnected from the Internet.
...morePublished: 2019-03-07 23:41:03
Popularity: None
Author: Dan Goodin
Trove includes home and cell phone numbers, e-mail addresses and some home addresses.
...morePublished: 2019-03-07 23:41:02
Popularity: None
Author: Dan Goodin
"Off-path" attack means hackers can be anywhere with no man-in-the-middle needed.
...morePublished: 2019-03-07 23:39:57
Popularity: None
Author: Dan Goodin
Exploit against Cisco's PIX line of firewalls remotely extracted crypto keys.
...morePublished: 2019-03-07 23:37:40
Popularity: None
Author: Dan Goodin
Technique works on virtually all USB drives with no modifications necessary.
...morePublished: 2019-03-07 23:37:12
Popularity: None
Author: Dan Goodin
20 seconds of physical access with a $50 device is all it takes.
...morePublished: 2019-03-07 23:37:01
Popularity: None
Author: Dan Goodin
Google releases fixes for newer devices and ejects apps following reports.
...morePublished: 2019-03-07 23:36:16
Popularity: None
Author: Dan Goodin
The curious case of Firefox's (now fixed) certificate pinning failure.
...morePublished: 2019-03-07 23:33:40
Popularity: None
Author: Dan Goodin
Once unthinkable, 1 terabit attacks may soon be the new normal.
...morePublished: 2019-03-07 23:33:36
Popularity: None
Author: Dan Goodin
Zerodium triples price for iOS exploits, doubles Android bounties to $200,000.
...morePublished: 2019-03-07 23:32:08
Popularity: None
Author: Dan Goodin
Technique allows attackers to passively decrypt Diffie-Hellman protected data.
...morePublished: 2019-03-07 23:31:49
Popularity: None
Author: Dan Goodin
Lurking in the kernel for nine years, flaw gives untrusted users unfettered root access.
...morePublished: 2019-03-07 23:30:19
Popularity: None
Author: Dan Goodin
Shadow Brokers identifies hundreds of organizations it claims were hacked by NSA.
...morePublished: 2019-03-07 23:29:36
Popularity: None
Author: Dan Goodin
The perils of leaving computers unattended is about to get worse.
...morePublished: 2019-03-07 23:29:07
Popularity: None
Author: Dan Goodin
Firmware that actively tries to hide itself allows attackers to install apps as root.
...morePublished: 2019-03-07 23:26:46
Popularity: None
Author: Dan Goodin
For six months, the remote management app has opened users to code-execution attacks.
...morePublished: 2019-03-07 23:26:45
Popularity: None
Author: Dan Goodin
Critical code-execution flaw resides in Windows, Mac, and Linux. Patch now.
...morePublished: 2019-03-07 23:25:36
Popularity: None
Author: Dan Goodin
Privacy-preserving “cryptographic assertions” are impossible to guess or phish.
...morePublished: 2019-03-07 23:24:01
Popularity: None
Author: Dan Goodin
With 8 days before inauguration of Donald Trump, leak is sure to inflame US officials.
...morePublished: 2019-03-07 23:23:52
Popularity: None
Author: Dan Goodin
For the second year in a row, hack targets Ukraine during one of its coldest months.
...morePublished: 2019-03-07 23:21:09
Popularity: None
Author: Dan Goodin
Publicly known “magic string” lets any site run malicious code, no questions asked.
...morePublished: 2019-03-07 23:21:08
Popularity: None
Author: Dan Goodin
HummingWhale is back with new tricks, including a way to gin user ratings.
...morePublished: 2019-03-07 23:20:49
Popularity: None
Author: Dan Goodin
Prosecutors reportedly plan to charge Harold T. Martin with espionage.
...morePublished: 2019-03-07 23:20:48
Popularity: None
Author: Dan Goodin
Online tracking gets more accurate and harder to evade.
...morePublished: 2019-03-07 23:20:29
Popularity: None
Author: Dan Goodin
If you use NextGEN Gallery, now would be a good time to update.
...morePublished: 2019-03-07 23:20:28
Popularity: None
Author: Dan Goodin
String of unpatched security flaws comes after February Patch Tuesday was canceled.
...morePublished: 2019-03-07 23:19:52
Popularity: None
Author: Dan Goodin
Critical infrastructure, media, and scientists targeted by suspected nation-state.
...morePublished: 2019-03-07 23:19:23
Popularity: None
Author: Dan Goodin
A property found in virtually all modern CPUs neuters decade-old security protection.
...morePublished: 2019-03-07 23:19:17
Popularity: None
Author: Dan Goodin
Company knocks $350 million off its purchase price.
...morePublished: 2019-03-07 23:18:43
Popularity: None
Author: Dan Goodin
Xagent for Macs steals passwords, grabs screenshots, and exfiltrates iPhone backups.
...morePublished: 2019-03-07 23:17:39
Popularity: None
Author: Dan Goodin
Algorithm underpinning Internet security falls to first-known collision attack.
...morePublished: 2019-03-07 23:16:59
Popularity: None
Author: Dan Goodin
"Fake ID" exploits work because Android doesn't properly inspect certificates.
...morePublished: 2019-03-07 23:16:41
Popularity: None
Author: Dan Goodin
Researchers devise stealthy attack that reprograms USB device firmware.
...morePublished: 2019-03-07 23:14:29
Popularity: None
Author: Dan Goodin
Stripped down package means there will be three independent versions of OpenSSL.
...morePublished: 2019-03-07 23:14:20
Popularity: None
Author: Dan Goodin
In a first, one player got a monopoly of Bitcoin's total computational power.
...morePublished: 2019-03-07 23:13:52
Popularity: None
Author: Dan Goodin
Vulnerability one of nine critical weaknesses from lawful intercept provider.
...morePublished: 2019-03-07 23:13:27
Popularity: None
Author: Dan Goodin
Google Play crawler uncovers secret tokens to Facebook, Twitter, and AWS.
...morePublished: 2019-03-07 23:13:03
Popularity: None
Author: Dan Goodin
Privilege escalation bug lets untrusted users wrest control of vulnerable systems.
...morePublished: 2019-03-07 23:12:47
Popularity: None
Author: Dan Goodin
Two-year hacking spree ransacked e-mail account belonging to chief of police.
...morePublished: 2019-03-07 23:12:40
Popularity: None
Author: Dan Goodin
Bug in crypto library strips away one of the Internet's most crucial protections.
...morePublished: 2019-03-07 23:11:57
Popularity: None
Author: Dan Goodin
Exploits for easy-to-spot bug are trivial, reliable, and publicly available.
...morePublished: 2019-03-07 23:11:32
Popularity: None
Author: Dan Goodin
As a candidate, Trump VP castigated Clinton for use of a private e-mail server.
...morePublished: 2019-03-07 23:11:00
Popularity: None
Author: Dan Goodin
Hackers are still exploiting the bug to install malware on high-impact sites.
...morePublished: 2019-03-07 23:10:50
Popularity: None
Author: Dan Goodin
Sorry! That’s a feature not a bug.
...morePublished: 2019-03-07 23:09:52
Popularity: None
Author: Dan Goodin
Chrome to immediately stop recognizing EV status and gradually nullify all certs.
...morePublished: 2019-03-07 23:09:30
Popularity: None
Author: Dan Goodin
Only an estimated 6% of Android phones randomize MACs, and they do it poorly.
...morePublished: 2019-03-07 23:07:52
Popularity: None
Author: Dan Goodin
Demo exploit is inexpensive, remote, scalable—and opens door to more advanced hacks.
...morePublished: 2019-03-07 23:07:21
Popularity: None
Author: Dan Goodin
Ongoing "BrickerBot" attacks might be trying to kill devices before they can join a botnet.
...morePublished: 2019-03-07 23:07:10
Popularity: None
Author: Dan Goodin
WikiLeaks dump identical to operation that has been hacking governments since 2011.
...morePublished: 2019-03-07 23:06:51
Popularity: None
Author: Dan Goodin
Microsoft fixed critical vulnerabilities in uncredited update released in March.
...morePublished: 2019-03-07 23:05:15
Popularity: None
Author: Dan Goodin
Greyhound allows four-digit PINs and stores them in plaintext.
...morePublished: 2019-03-07 23:04:08
Popularity: None
Author: Dan Goodin
The same weakness could be used to eavesdrop on calls and track users’ locations.
...morePublished: 2019-03-07 23:03:09
Popularity: None
Author: Dan Goodin
Company president specifically notes role of NSA code used by Ransomware worm.
...morePublished: 2019-03-07 23:01:59
Popularity: None
Author: Dan Goodin
Yahoo promptly retired ImageMagic library after failing to install 2-year-old patch.
...morePublished: 2019-03-07 23:00:11
Popularity: None
Author: Dan Goodin
Latest Vault7 release exposes network-spying operation CIA kept secret since 2007.
...morePublished: 2019-03-07 22:59:57
Popularity: None
Author: Dan Goodin
Is there a fuzzer in the house?
...morePublished: 2019-03-07 22:54:32
Popularity: None
Author: Dan Goodin
Compromised accounts push fraudulent extension updates to unsuspecting users.
...morePublished: 2019-03-07 22:54:29
Popularity: None
Author: Dan Goodin
Fancy Bear used Eternal Blue 3 months after it was leaked by a mysterious group.
...morePublished: 2019-03-07 22:44:16
Popularity: None
Author: Dan Goodin
TorMoil threatens Mac and Linux versions of Tor browser; Windows and Tails not affected.
...morePublished: 2019-03-07 22:39:35
Popularity: None
Author: Dan Goodin
There's no online update mechanism for defective electronic safe.
...morePublished: 2019-03-07 22:39:29
Popularity: None
Author: Dan Goodin
Andromeda kingpin is identified by his ICQ number.
...morePublished: 2019-03-07 22:39:26
Popularity: None
Author: Dan Goodin
Previously undetected MoneyTaker gang is likely to strike again.
...morePublished: 2019-03-07 22:39:24
Popularity: None
Author: Dan Goodin
Previously undetected MoneyTaker gang is likely to strike again.
...morePublished: 2019-03-07 22:39:09
Popularity: None
Author: Dan Goodin
How extended validation certificates can be used to scam, not help, end users.
...morePublished: 2019-03-07 22:35:10
Popularity: None
Author: Dan Goodin
“Low complexity” hack for Transmission client may work against other clients, too.
...morePublished: 2019-03-07 22:34:59
Popularity: None
Author: Dan Goodin
Skygofree is among the most powerful spy platforms ever created for Android.
...morePublished: 2019-03-07 22:34:55
Popularity: None
Author: Dan Goodin
Google removes four extensions that used infected computers in click fraud scheme.
...morePublished: 2019-03-07 22:32:23
Popularity: None
Author: Dan Goodin
Adobe plans to have a fix for the critical flaw next week.
...morePublished: 2019-03-07 22:30:33
Popularity: None
Author: Dan Goodin
Crooks find poorly secured access credentials, use them to install stealth miner.
...morePublished: 2019-03-07 22:29:59
Popularity: None
Author: Dan Goodin
Full-featured trojan catered to password thieves, Peeping Toms, and ransomware scammers.
...morePublished: 2019-03-07 22:29:41
Popularity: None
Author: Dan Goodin
Flap that goes public renews troubling questions about issuance of certificates.
...morePublished: 2019-03-07 22:25:19
Popularity: None
Author: Dan Goodin
Bug patched in March is still being exploited to take full control of servers.
...morePublished: 2019-03-07 22:24:59
Popularity: None
Author: Dan Goodin
Almost 1,300 addresses for Amazon Route 53 rerouted for two hours.
...morePublished: 2019-03-07 22:23:18
Popularity: None
Author: Dan Goodin
JavaScript based GLitch pwns browsers by flipping bits inside memory chips.
...morePublished: 2019-03-07 22:22:36
Popularity: None
Author: Dan Goodin
The bar for exploiting potentially serious DDR weakness keeps getting lower.
...morePublished: 2019-03-07 22:21:38
Popularity: None
Author: Dan Goodin
Easily found bug in free demo let visitors track phones from four top US carriers.
...morePublished: 2019-03-07 22:21:29
Popularity: None
Author: Dan Goodin
VPNFilter can survive reboots and contains destructive "kill" function.
...morePublished: 2019-03-07 22:20:00
Popularity: None
Author: Dan Goodin
Cutting-edge hack exploited newly added graphics feature until it was patched.
...morePublished: 2019-03-07 22:19:45
Popularity: None
Author: Dan Goodin
Coming: FaceTime encryption, protected cam access, and, possibly, USB Restricted Mode.
...morePublished: 2019-03-07 22:18:43
Popularity: None
Author: Dan Goodin
17 images posted by a single account over 10 months may have generated $90,000.
...morePublished: 2019-03-07 22:18:37
Popularity: None
Author: Dan Goodin
SigSpoof flaw fixed in GnuPG, Enigmail, GPGTools, and python-gnupg.
...morePublished: 2019-03-07 22:16:50
Popularity: None
Author: Dan Goodin
This isn't the IP camera software you think it is.
...morePublished: 2019-03-07 22:07:43
Popularity: None
Author: Dan Goodin
Fee-based service couples the security of a private server with the reliability of the cloud.
...morePublished: 2019-03-07 22:06:28
Popularity: None
Author: Dan Goodin
Just-announced beta seals sender details inside encrypted envelope.
...morePublished: 2019-03-07 22:05:57
Popularity: None
Author: Dan Goodin
Side-channel leak in Skylake and Kaby Lake chips probably affects AMD CPUs, too.
...morePublished: 2019-03-07 22:05:28
Popularity: None
Author: Dan Goodin
Google says it doesn't believe leak was malicious despite suspicious appearances.
...morePublished: 2019-03-07 22:04:07
Popularity: None
Author: Dan Goodin
Years-old UPnP vulnerability being used to expose ports 139 and 445.
...morePublished: 2019-03-07 21:59:02
Popularity: None
Author: Dan Goodin
Pear.php.net shuts down after maintainers discover serious supply-chain attack.
...morePublished: 2019-03-07 21:57:31
Popularity: None
Author: Dan Goodin
IE info bug was under active exploit; exploit code for Exchange flaw was circulating.
...morePublished: 2024-05-18 12:29:43
Popularity: None
Author: Dan Goodin
Ebury backdoors SSH servers in hosting providers, giving the malware extraordinary reach.
...morePublished: 2024-05-21 23:02:11
Popularity: None
Author: Dan Goodin
Ebury backdoors SSH servers in hosting providers, giving the malware extraordinary reach.
...morePublished: 2024-09-24 23:37:24
Popularity: None
Author: Dan Goodin
Emails, documents, and other untrusted content can plant malicious memories.
...more