Summary

Total Articles Found: 55

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • Let's Encrypt? Let's revoke 3 million HTTPS certificates on Wednesday, more like: Check code loop blunder strikes
  • We're not saying this is how SolarWinds was backdoored, but its FTP password 'leaked on GitHub in plaintext'
  • Maker of US border's license-plate scanning tech ransacked by hacker, blueprints and files dumped online
  • Supermicro spy chips, the sequel: It really, really happened, and with bad BIOS and more, insists Bloomberg
  • 'iOS security is f**ked' says exploit broker Zerodium: Prices crash for taking a bite out of Apple's core tech
  • Apple insists it's totally not doing that thing it wasn't accused of: We're not handing over Safari URLs to Tencent – just people's IP addresses
  • Cop a load of this: 1TB of police body camera videos found lounging around public databases
  • This is the Send, encrypted end-to-end, this is the Send, my Mozillan friend
  • Apple network traffic takes mysterious detour through Russia
  • Mozilla returns crypto-signed website packaging spec to sender – yes, it's Google

EU attempt to sneak through new encryption-eroding law slammed by Signal, politicians

Published: 2024-06-18 22:22:06

Popularity: 12

Author: Thomas Claburn

LLM Says: "Signal fail 🚫🔒"

If you call 'client-side scanning' something like 'upload moderation,' it still undermines privacy, security On Thursday, the EU Council is scheduled to vote on a legislative proposal that would attempt to protect children online by disallowing confidential communication.…

...more

Arm security defense shattered by speculative execution 95% of the time

Published: 2024-06-18 01:11:09

Popularity: 18

Author: Thomas Claburn

LLM Says: ""Speculative fail""

'TikTag' security folks find anti-exploit mechanism rather fragile In 2018, chip designer Arm introduced a hardware security feature called Memory Tagging Extensions (MTE) as a defense against memory safety bugs. But it may not be as effective as first hoped.…

...more

Stanford Internet Observatory wilts under legal pressure during election year

Published: 2024-06-14 21:38:05

Popularity: 32

Author: Thomas Claburn

LLM Says: "Censored"

Because who needs disinformation research at times like these The Stanford Internet Observatory (SIO), which for the past five years has been studying and reporting on social media disinformation, is being reimagined with new management and fewer staff following the recent departure of research director Renee DiResta.…

...more

Judge orders NSO to cough up Pegasus super-spyware source code

Published: 2024-03-01 21:34:29

Popularity: 31

Author: Thomas Claburn

/* Hope no one ever reads these functions lmao */ NSO Group, the Israel-based maker of super-charged snoopware Pegasus, has been ordered by a federal judge in California to share the source code for "all relevant spyware" with Meta's WhatsApp.…

...more

European Court of Human Rights declares backdoored encryption is illegal

Published: 2024-02-15 07:26:08

Popularity: 49

Author: Thomas Claburn

Surprising third-act twist as Russian case means more freedom for all The European Court of Human Rights (ECHR) has ruled that laws requiring crippled encryption and extensive data retention violate the European Convention on Human Rights – a decision that may derail European data surveillance legislation known as Chat Control.…

...more

Mozilla decides Trusted Types is a worthy security feature

Published: 2023-12-21 11:03:11

Popularity: 11

Author: Thomas Claburn

DOM-XSS attacks have become scarce on Google websites since TT debuted Mozilla last week revised its position on a web security technology called Trusted Types, which it has decided to implement in its Firefox browser.…

...more

Microsoft Bing Chat pushes malware via bad ads

Published: 2023-09-29 20:54:11

Popularity: 21

Author: Thomas Claburn

From AI to just plain aaaiiiee! Microsoft introduced its Bing Chat AI search assistant in February and a month later began serving ads alongside it to help cover costs.…

...more

Signal adopts new alphabet jumble to protect chats from quantum computers

Published: 2023-09-20 20:28:11

Popularity: 16

Author: Thomas Claburn

X3DH readied for retirement as PQXDH is rolled out Signal has adopted a new key agreement protocol in an effort to keep encrypted Signal chat messages protected from any future quantum computers.…

...more

Chromebook SH1MMER exploit promises admin jailbreak

Published: 2023-01-30 22:45:14

Popularity: 29

Author: Thomas Claburn

Schools' laptops are out if this one gets around, tho beware bricking Users of enterprise-managed Chromebooks now, for better or worse, have a way to break the shackles of administrative control through an exploit called SHI1MMER.…

...more

'Fully undetectable' Windows backdoor gets detected

Published: 2022-10-18 20:14:08

Popularity: 28

Author: Thomas Claburn

SafeBreach supposedly spots somewhat stealthy subversive software SafeBreach Labs says it has detected a novel fully undetectable (FUD) PowerShell backdoor, which calls into question the accuracy of threat naming.…

...more

PyPI warns of first-ever phishing campaign against its users

Published: 2022-08-26 19:21:03

Popularity: 21

Author: Thomas Claburn

On the bright side, top devs are getting hardware security keys The Python Package Index, better known among developers as PyPI, has issued a warning about a phishing attack targeting developers who use the service.…

...more

Apple network traffic takes mysterious detour through Russia

Published: 2022-07-27 18:56:38

Popularity: 186

Author: Thomas Claburn

Land of Putin capable of attacking routes in cyberspace as well as real world Apple's internet traffic took an unwelcome detour through Russian networking equipment for about twelve hours between July 26 and July 27.…

...more

Actual quantum computers don't exist yet. The cryptography to defeat them may already be here

Published: 2022-07-05 22:36:33

Popularity: 29

Author: Thomas Claburn

NIST pushes ahead with CRYSTALS-KYBER, CRYSTALS-Dilithium, FALCON, SPHINCS+ algorithms The US National Institute of Standards and Technology (NIST) has recommended four cryptographic algorithms for standardization to ensure data can be protected as quantum computers become more capable of decryption.…

...more

OpenSSL 3.0.5 awaits release to fix potential worse-than-Heartbleed flaw

Published: 2022-06-27 23:30:34

Popularity: 30

Author: Thomas Claburn

Though severity up for debate, and limited chips affected, broken tests hold back previous patch from distribution Updated  The latest version of OpenSSL v3, a widely used open-source library for secure networking using the Transport Layer Security (TLS) protocol, contains a memory corruption vulnerability that imperils x64 systems with Intel's Advanced Vector Extensions 512 (AVX512).…

...more

Mega's unbreakable encryption proves to be anything but

Published: 2022-06-22 20:58:14

Popularity: 26

Author: Thomas Claburn

Boffins devise five attacks to expose private files Mega, the New Zealand-based file-sharing biz co-founded a decade ago by Kim Dotcom, promotes its "privacy by design" and user-controlled encryption keys to claim that data stored on Mega's servers can only be accessed by customers, even if its main system is taken over by law enforcement or others.…

...more

Apple M1 chip contains hardware vulnerability that bypasses memory defense

Published: 2022-06-10 11:00:08

Popularity: 60

Author: Thomas Claburn

MIT CSAIL boffins devise PACMAN attack to let existing exploits avoid pointer authentication Apple's M1 chip has been found to contain a hardware vulnerability that can be abused to disable one of its defense mechanisms against memory corruption exploits, giving such attacks a greater chance of success.…

...more

Another data-leaking Spectre bug found, smashes Intel, Arm defenses

Published: 2022-03-15 09:22:14

Popularity: 21

Author: Thomas Claburn

Your processor design fell off the vulnerability tree and hit every branch on the way down Analysis  Intel this month published an advisory to address a novel Spectre v2 vulnerability in its processors that can be exploited by malware to steal data from memory that should otherwise be off limits.…

...more

Worried about occasional npm malware scares? It's more common than you may think

Published: 2022-02-03 01:05:07

Popularity: 31

Author: Thomas Claburn

WhiteSource says it spotted 1,300 malicious JavaScript packages in 2021 alone Malware gets spotted in GitHub's npm registry every few months, elevating concerns about the software supply chain until attention gets diverted and worries recede until the next fire drill.…

...more

When the world ends, all that will be left are cockroaches and new Rowhammer attacks: RAM defenses broken again

Published: 2021-11-15 21:46:49

Popularity: 19

Author: Thomas Claburn

Blacksmith is latest hammer horror Boffins at ETH Zurich, Vrije Universiteit Amsterdam, and Qualcomm Technologies have found that varying the order, regularity, and intensity of rowhammer attacks on memory chips can defeat defenses, thereby compromising security on any device with DRAM.…

...more

Microsoft Exchange Autodiscover protocol found leaking hundreds of thousands of credentials

Published: 2021-09-22 13:00:04

Popularity: 40

Author: Thomas Claburn

Email clients fail over to unexpected domains if they can't find the right resources A flaw in Microsoft's Autodiscover protocol, used to configure Exchange clients like Outlook, can cause user credentials to leak to miscreants in certain circumstances.…

...more

Yes, of course there's now malware for Windows Subsystem for Linux

Published: 2021-09-17 22:06:04

Popularity: 116

Author: Thomas Claburn

Once dismissed proof-of-concept attack on Microsoft OS through WSL detected in the wild Updated  Linux binaries have been found trying to take over Windows systems in what appears to be the first publicly identified malware to utilize Microsoft's Windows Subsystem for Linux (WSL) to install unwelcome payloads.…

...more

You can hijack Google Cloud VMs using DHCP floods, says this guy, once the stars are aligned and...

Published: 2021-06-30 00:02:21

Popularity: 14

Author: Thomas Claburn

An Ocean's 11 of exploitation involving guessable random numbers and hostname shenanigans Google Compute Engine virtual machines can be hijacked and made to hand over root shell access via a cunning DHCP attack, according to security researcher Imre Rad.…

...more

Hard cheese: Stilton snap shared via EncroChat leads to drug dealer's downfall

Published: 2021-05-25 06:30:07

Popularity: 37

Author: Thomas Claburn

Brit thrown in the clink for 13 years after 'palm-print' lifted from internet photo A drug dealer's ham-handed OPSEC allowed British police to identify him from a picture of him holding a block of cheese, which led to his arrest, guilty plea, and a sentence of 13 years and six months in prison.…

...more

Supermicro spy chips, the sequel: It really, really happened, and with bad BIOS and more, insists Bloomberg

Published: 2021-02-12 23:28:36

Popularity: 823

Author: Thomas Claburn

Server maker says latest article is 'a mishmash of disparate allegations' Following up on a disputed 2018 claim in its BusinessWeek publication that tiny spy chips were found on Supermicro server motherboards in 2015, Bloomberg on Friday doubled down by asserting that Supermicro's products were targeted by Chinese operatives for over a decade, that US intelligence officials have been aware of this, and that authorities kept this information quiet while crafting defenses in order to study the attack.…

...more

Google QUIC-ly left privacy behind in its quest for a speedier internet, boffins find

Published: 2021-01-30 00:10:32

Popularity: 60

Author: Thomas Claburn

Promising protocol much easier to fingerprint than HTTPS Google's QUIC (Quick UDP Internet Connections) protocol, announced in 2013 as a way to make the web faster, waited seven years before being implemented in the ad giant's Chrome browser. But it still arrived before privacy could get there.…

...more

Dnsmasq, used in only a million or more internet-facing devices globally, patches not-so-secret seven spoofing, hijacking flaws

Published: 2021-01-20 01:49:43

Popularity: 90

Author: Thomas Claburn

Get your updates when you can for gear from scores of manufacturers Seven vulnerabilities have been found in a popular DNS caching proxy and DHCP server known as dnsmasq, raising the possibility of widespread online attacks on networking devices.…

...more

We're not saying this is how SolarWinds was backdoored, but its FTP password 'leaked on GitHub in plaintext'

Published: 2020-12-16 00:00:12

Popularity: 918

Author: Thomas Claburn

'solarwinds123' won't inspire confidence, if true Updated  SolarWinds, the maker of the Orion network management software that was subverted to distribute backdoored updates that led to the compromise of multiple US government bodies, was apparently told last year that credentials for its software update server had been exposed in a public GitHub repo.…

...more

Sigh. Another day, another reason for WordPress users to get patching: Hackers abuse bug in popular plugin

Published: 2020-09-03 23:20:48

Popularity: 61

Author: Thomas Claburn

Sites with WP File Manager should update ASAP – exploits in the wild A critical vulnerability in a popular WordPress plugin called WP File Manager was spotted on Tuesday and was quickly patched by the plugin's developers.…

...more

We're suing Google for harvesting our personal info even though we opted out of Chrome sync – netizens

Published: 2020-07-28 19:40:18

Popularity: 114

Author: Thomas Claburn

Browser quitters say they'll return if web goliath lives up to privacy promises A handful of Chrome users have sued Google, accusing the browser maker of collecting personal information despite their decision not to sync data stored in Chrome with a Google Account.…

...more

Boffins find that over nine out of ten 'ethical' hackers are being a bit naughty when it comes to cloud services

Published: 2020-06-17 06:57:04

Popularity: 94

Author: Thomas Claburn

Then again, cloud providers aren't exactly playing the smart game either Infosec pros and hackers regularly abuse cloud service providers to conduct reconnaissance and attacks, despite efforts by cloud providers to limit such activity.…

...more

Another month, another way to smash Intel's SGX security. Let's take a closer look at these latest holes...

Published: 2020-06-10 23:04:30

Popularity: 61

Author: Thomas Claburn

Plus: 10nm five-core 3GHz Lakefield system-on-chips announced Analysis  Intel's Software Guard Extensions, known as SGX among friends, consist of a set of instructions for running a secure enclave inside an encrypted memory partition using certain Intel microprocessors.…

...more

To test its security mid-pandemic, GitLab tried phishing its own work-from-home staff. 1 in 5 fell for it

Published: 2020-05-21 20:51:10

Popularity: 155

Author: Thomas Claburn

Welp, at least that's better than industry averages, says code-hosting biz Code hosting biz GitLab recently concluded a security exercise to test the susceptibility of its all-remote workforce to phishing – and a fifth of the participants submitted their credentials to the fake login page.…

...more

'iOS security is f**ked' says exploit broker Zerodium: Prices crash for taking a bite out of Apple's core tech

Published: 2020-05-14 10:31:11

Popularity: 706

Author: Thomas Claburn

LLM Says: "Apple hacked"

Million-dollar payouts zero out as hackers follow the money en masse Five years ago, Zerodium offered a $1m reward for a browser-based, untethered jailbreak in iOS 9. On Wednesday, the software exploit broker said it won't pay anything for some iOS bugs due to an oversupply.…

...more

IBM == Insecure Business Machines: No-auth remote root exec exploit in Data Risk Manager drops after Big Blue snubs bug report

Published: 2020-04-21 19:04:48

Popularity: 152

Author: Thomas Claburn

IT giant admits it made 'a process error, improper response' to flaw finder IBM has acknowledged that it mishandled a bug report that identified four vulnerabilities in its enterprise security software, and plans to issue an advisory.…

...more

Let's Encrypt? Let's revoke 3 million HTTPS certificates on Wednesday, more like: Check code loop blunder strikes

Published: 2020-03-03 19:44:53

Popularity: 1160

Author: Thomas Claburn

Tons of TLS certs need to be tossed immediately after Go snafu On Wednesday, March 4, Let's Encrypt – the free, automated digital certificate authority – will briefly become Let's Revoke, to undo the issuance of more than three million flawed HTTPS certs.…

...more

Mind the gap: Google patches holes in Chrome – exploit already out there for one of them after duo spot code fix

Published: 2020-02-25 21:22:19

Popularity: 88

Author: Thomas Claburn

Pair engineer malicious code from public source tweak before official binary releases Google has updated Chrome for Linux, Mac, and Windows to address three security vulnerabilities – and exploit code for one of them is already public, so get patching.…

...more

Voatz of no confidence: MIT boffins eviscerate US election app, claim fiends could exploit flaws to derail democracy

Published: 2020-02-13 21:58:19

Popularity: 78

Author: Thomas Claburn

Shoddy code allegations are just FUD, software maker insists Only a week after the mobile app meltdown in Iowa's Democratic Caucus, computer scientists at MIT have revealed their analysis of the Voatz app used in West Virginia's 2018 midterm election.…

...more

Google halts paid-for Chrome extension updates amid fraud surge: Web Store in lockdown 'due to the scale of abuse'

Published: 2020-01-27 19:58:06

Popularity: 83

Author: Thomas Claburn

Meanwhile, probe reveals how Avast's 'anonymized' user data can be, er, deanonymized On Saturday, Google temporarily disabled the ability to publish paid Chrome apps, extensions, and themes in the Chrome Web Store due to a surge in fraud.…

...more

If there's somethin' stored in a secure enclave, who ya gonna call? Membuster!

Published: 2019-12-05 22:22:19

Popularity: 153

Author: Thomas Claburn

Boffins ride the memory bus past Intel's SGX to your data Computer scientists from UC Berkeley, Texas A&M, and semiconductor biz SK Hynix have found a way to defeat secure enclave protections by observing memory requests from a CPU to off-chip DRAM through the memory bus.…

...more

Intel might want to reconsider the G part of SGX – because it's been plunderstruck

Published: 2019-12-10 18:00:07

Popularity: 60

Author: Thomas Claburn

I was caught in the middle of a memory attack, and I knew there was no turning back Intel on Tuesday plans to release 11 security advisories, including a microcode firmware update to patch a vulnerability in its Software Guard Extensions (SGX) on recent Core microprocessors that allows a privileged attacker to corrupt SGX enclave computations.…

...more

Apple insists it's totally not doing that thing it wasn't accused of: We're not handing over Safari URLs to Tencent – just people's IP addresses

Published: 2019-10-14 20:05:40

Popularity: 605

Author: Thomas Claburn

Cupertino in China Syndrome meltdown Responding to concern that its Safari browser's defense against malicious websites may reveal the IP addresses of some users' devices to China-based Tencent, Apple insists that Safari doesn't reveal a different bit of information, the webpages Safari users visit.…

...more

Dear Planet Earth: Patch Webmin now – zero-day exploit emerges for potential hijack hole in server control panel

Published: 2019-08-19 20:28:13

Popularity: 49

Author: Thomas Claburn

Flawed code traced to home build system, vulnerability can be attacked in certain configs Updated  The maintainers of Webmin – an open-source application for system-administration tasks on Unix-flavored systems – have released Webmin version 1.930 and the related Usermin version 1.780 to patch a vulnerability that can be exploited to achieve remote code execution in certain configurations.…

...more

No REST for the wicked: Ruby gem hacked to siphon passwords, secrets from web devs

Published: 2019-08-20 21:21:17

Popularity: 68

Author: Thomas Claburn

Developer account cracked due to credential reuse, source tampered with and released to hundreds of programmers An old version of a Ruby software package called rest-client that was modified and released about a week ago has been removed from the Ruby Gems repository – because it was found to be deliberately leaking victims' credentials to a remote server.…

...more

Biz forked out $115k to tout 'Time AI' crypto at Black Hat. Now it sues organizers because hackers heckled it

Published: 2019-08-26 08:02:06

Popularity: 89

Author: Thomas Claburn

Lawsuit argues event bosses breached deal by failing to prevent audience hostility Crown Sterling, a Newport Beach, California-based biz that calls itself "a leading digital cryptographic firm," is suing UBM, the UK-based owner of the Black Hat USA conference, in America for allegedly violating its sponsorship agreement.…

...more

HTTP/2, Brute! Then fall, server. Admin! Ops! The server is dead

Published: 2019-08-14 09:02:08

Popularity: 84

Author: Thomas Claburn

Beware the denials of service: Netflix warns of eight networking bugs On Tuesday, Netflix, working in conjunction with Google and CERT/CC, published a security advisory covering a series of vulnerabilities that enable denial of service attacks against servers running HTTP/2 services.…

...more

In the cooler for the next three years: Hacker of iCloud accounts used by athletes and rappers

Published: 2019-07-19 23:58:06

Popularity: 124

Author: Thomas Claburn

Phishing led to shopping spree with victims' credit cards A man from the US state of Georgia who pleaded guilty in March to breaking into the Apple iCloud accounts of sports and entertainment figures was sentenced on Thursday to three years and one month in federal prison – and ordered to pay almost $700,000 in restitution.…

...more

Malicious code ousted from PureScript's npm installer – but who put it there in the first place?

Published: 2019-07-15 06:04:06

Popularity: 108

Author: Thomas Claburn

Account hijacking claimed by some but it may just be a developer behaving badly Another JavaScript package in the npm registry - the installer for PureScript - has been tampered with, leading project maintainers to revise their software to purge the malicious code.…

...more

Cop a load of this: 1TB of police body camera videos found lounging around public databases

Published: 2019-07-01 22:18:59

Popularity: 332

Author: Thomas Claburn

Miscreants grabbed sensitive footage belonging to officers in Miami, elsewhere, it is feared In yet another example of absent security controls, troves of police body camera footage were left open to the world for anyone to siphon off, according to an infosec biz.…

...more

Mozilla returns crypto-signed website packaging spec to sender – yes, it's Google

Published: 2019-05-30 20:58:34

Popularity: 161

Author: Thomas Claburn

Ad giant's site slurping tech complicates web security model, could give more power to search engines and social networks, Firefox maker warns Mozilla has published a series of objections to web packaging, a content distribution scheme proposed by engineers at Google that the Firefox maker considers harmful to the web in its current form.…

...more

Maker of US border's license-plate scanning tech ransacked by hacker, blueprints and files dumped online

Published: 2019-05-23 23:45:19

Popularity: 884

Author: Thomas Claburn

LLM Says: ""Hacked Wide Open""

Perceptics confirms intrusion and theft, stays quiet on details Exclusive  The maker of vehicle license plate readers used extensively by the US government and cities to identify and track citizens and immigrants has been hacked. Its internal files were pilfered, and are presently being offered for free on the dark web to download.…

...more

This is the Send, encrypted end-to-end, this is the Send, my Mozillan friend

Published: 2019-03-13 06:38:05

Popularity: 227

Author: Thomas Claburn

Ride the fox, ride the fox Mozilla's Firefox Send, a free encrypted file sharing service, graduated from test to official release on Tuesday after a year and half of refinement.…

...more

FYI: Data from deleted GitHub repos may not actually be deleted

Published: 2024-07-25 19:51:32

Popularity: 15

Author: Thomas Claburn

LLM Says: ""Still accessible""

And the forking Microsoft-owned code warehouse doesn't see this as much of a problem Researchers at Truffle Security have found, or arguably rediscovered, that data from deleted GitHub repositories (public or private) and from deleted copies (forks) of repositories isn't necessarily deleted.…

...more

This uni thought it would be a good idea to do a phishing test with a fake Ebola scare

Published: 2024-08-22 10:32:13

Popularity: 22

Author: Thomas Claburn

LLM Says: "Ebola Alert"

Needless to say, it backfired in a big way University of California Santa Cruz (UCSC) students may be relieved to hear that an emailed warning about a staff member infected with the Ebola virus was just a phishing exercise.…

...more

Rock Chrome hard enough and get paid half a million

Published: 2024-08-29 16:30:12

Popularity: 7

Author: Thomas Claburn

LLM Says: "💸💥🔨💰"

Google revises Chrome Vulnerability Rewards Program with higher payouts for bug hunters Google's Chrome Vulnerability Rewards Program (VRP) is now significantly more rewarding – with a top payout that's at least twice as substantial.…

...more

White House thinks it's time to fix the insecure glue of the internet: Yup, BGP

Published: 2024-09-03 22:34:09

Popularity: 12

Author: Thomas Claburn

LLM Says: "Routed fail GIF"

Better late than never The White House on Tuesday indicated it hopes to shore up the weak security of internet routing, specifically the Border Gateway Protocol (BGP).…

...more

end