Automation is making attacks on open source code repositories harder to fight.
...moreTotal Articles Found: 393
Top sources:
Top Keywords:
Top Authors
Top Articles:
Published: 2024-04-01 00:36:06
Popularity: None
Author: Dan Goodin
Automation is making attacks on open source code repositories harder to fight.
...morePublished: 2024-02-18 17:36:21
Popularity: None
Author: Ashley Belanger
Air Canada appears to have quietly killed its costly chatbot support.
...morePublished: 2024-02-07 05:13:33
Popularity: None
Author: Dan Goodin
Buffer overflow in bootloader shim allows attackers to run code each time devices boot up.
...morePublished: 2024-01-28 12:59:43
Popularity: None
Author: Dan Goodin
How does a legacy test account grant access to read every Office 365 account?
...morePublished: 2024-01-10 15:09:11
Popularity: None
Author: Dan Goodin
Researchers identify 23 vulnerabilities, some of which can exploited with no authentication.
...morePublished: 2023-12-19 20:41:24
Popularity: None
Author: Dan Goodin
Novel Terrapin attack uses prefix truncation to downgrade the security of SSH channels.
...morePublished: 2023-11-22 14:21:12
Popularity: None
Author: Ron Amadeo
Nothing promised end-to-end encryption, then stored texts publicly in plaintext.
...morePublished: 2023-11-15 13:35:42
Popularity: None
Author: Dan Goodin
Among other things, bug allows code running inside a VM to crash hypervisors.
...morePublished: 2023-11-14 23:16:40
Popularity: None
Author: Dan Goodin
An error as small as a single flipped memory bit is all it takes to expose a private key.
...morePublished: 2023-11-14 19:31:29
Popularity: None
Author: Dan Goodin
An error as small as a single flipped memory bit is all it takes to expose a private key.
...morePublished: 2023-11-07 20:30:07
Popularity: None
Author: Dan Goodin
Atlassian's senior management is all but begging customers to take immediate action.
...morePublished: 2023-10-27 16:28:15
Popularity: None
Author: Dan Goodin
New technique produces lots of bitflips and could one day help form an attack.
...morePublished: 2023-10-27 12:03:47
Popularity: None
Author: Dan Goodin
New technique produces lots of bitflips and could one day help form an attack.
...morePublished: 2023-09-27 16:06:32
Popularity: None
Author: Dan Goodin
A previously unknown compression side channel in GPUs can expose images thought to be private.
...morePublished: 2023-09-13 16:33:57
Popularity: None
Author: Dan Goodin
It's not too late to check if a Linux device you use was targeted.
...morePublished: 2023-05-27 10:49:55
Popularity: None
Author: Kevin Purdy
Please, please, please do not actually install XP and use it. But if you must…
...morePublished: 2023-05-17 03:45:51
Popularity: None
Author: Dan Goodin
With no easy way to revoke compromised keys, MSI, and its customers, are in a real pickle.
...morePublished: 2023-05-15 12:01:30
Popularity: None
Author: Andrew Cunningham
Fix will eventually render all kinds of older Windows boot media unbootable.
...morePublished: 2022-08-31 19:13:01
Popularity: None
Author: None
Sensor for already dry clothes relied on smartphone app, servers to work.
...morePublished: 2021-09-30 15:19:35
Popularity: None
Author: Eric Bangeman
Ilya Sachkov is founder of Group-IB, which specializes in ransomware attack prevention.
...morePublished: 2021-07-08 10:55:17
Popularity: None
Author: Dan Goodin
Game-over code-execution attacks are still possible even after fix is installed.
...morePublished: 2021-02-04 01:41:49
Popularity: None
Author: Jim Salter
Adobe: You can't use Flash in 2021. South Africa: Watch me!
...morePublished: 2020-10-05 23:54:44
Popularity: None
Author: Dan Goodin
Attackers are going to great lengths to gain the highest level of persistence.
...morePublished: 2020-05-27 21:09:58
Popularity: None
Author: Jim Salter
SuperHappyFunGame, once installed, could steal the focus from unrelated apps.
...morePublished: 2020-03-30 15:54:44
Popularity: None
Author: Jim Salter
It's a good day for WireGuard users—DKMS builds will soon be behind us.
...morePublished: 2020-02-27 05:14:08
Popularity: None
Author: Jim Salter
Intel's security plans sound a lot like "we're going to catch up to AMD."
...morePublished: 2020-01-29 06:36:28
Popularity: None
Author: Jon Brodkin
Despite net neutrality repeal, Comcast spent less on expanding cable network.
...morePublished: 2020-01-21 06:30:57
Popularity: None
Author: Jon Brodkin
Frontier subscribers suffer from poor customer service and failing networks.
...morePublished: 2020-01-16 20:50:18
Popularity: None
Author: Jim Salter
Goodbye, dedicated paste-spreading tool—and hello, wide-tipped applicator.
...morePublished: 2020-01-09 16:28:00
Popularity: None
Author: Dan Goodin
Flaw allows attackers to access sensitive memory locations that are normally off-limits.
...morePublished: 2020-01-08 14:43:32
Popularity: None
Author: Dan Goodin
Behold: the world's first known chosen-prefix collision of widely used hash function.
...morePublished: 2019-10-23 03:54:24
Popularity: None
Author: Ron Amadeo
Quickly hop between your top two MVNO networks thanks to dual SIM support.
...morePublished: 2019-09-29 02:38:59
Popularity: None
Author: Dan Goodin
Unpatchable vulnerability is a game-changer that even Apple will be unable to stop.
...morePublished: 2019-09-06 22:22:13
Popularity: None
Author: Dan Goodin
Google has so far remained mum on the flaw, which affects fully patched devices.
...morePublished: 2019-06-30 19:03:47
Popularity: None
Author: Jim Salter
"It's ridiculous vendors are replying to researchers via general counsel, not bug bounty."
...morePublished: 2019-06-16 14:25:09
Popularity: None
Author: Dan Goodin
RAMBleed side-channel attack works even when DRAM is protected by error-correcting code.
...morePublished: 2019-05-09 21:02:54
Popularity: None
Author: Sean Gallagher
Source code, network access being sold online by "Fxmsp" collective.
...morePublished: 2019-03-08 00:55:00
Popularity: None
Author: Dan Goodin
Technique discovered in June requires nothing more than spoofing a cookie.
...morePublished: 2019-03-08 00:54:56
Popularity: None
Author: Casey Johnston
Hundreds of thousands of dollars were spent to circumvent official channels.
...morePublished: 2019-03-08 00:54:55
Popularity: None
Author: Dan Goodin
Bug in open source analytics app may have compromised other services, too.
...morePublished: 2019-03-08 00:54:45
Popularity: None
Author: Robert Lemos
NGO in China is duped by old fashioned e-mails with malware-riddled attachments.
...morePublished: 2019-03-08 00:52:43
Popularity: None
Author: None
Internet surveillance gets 30 minutes on Morning Edition.
...morePublished: 2019-03-08 00:52:19
Popularity: None
Author: Dan Goodin
Google Play crawler uncovers secret tokens to Facebook, Twitter, and AWS.
...morePublished: 2019-03-08 00:50:40
Popularity: None
Author: Dan Goodin
TrueCrypt developer withholds permission, suggests "starting from scratch."
...morePublished: 2019-03-08 00:50:29
Popularity: None
Author: Dan Goodin
DIY guide provides instructions for carrying out similar muckraking exploits.
...morePublished: 2019-03-08 00:50:05
Popularity: None
Author: Robert Lemos
Users can wrap Facebook and other apps to better control their privacy and security, according to researchers from North Carolina State University.
...morePublished: 2019-03-08 00:50:00
Popularity: None
Author: Sean Gallagher
A week spent playing NSA reveals just how much data we leak online.
...morePublished: 2019-03-08 00:49:56
Popularity: None
Author: Ron Amadeo
Follow the endless iterations from Android 0.5 to Android 7 and beyond.
...morePublished: 2019-03-08 00:49:48
Popularity: None
Author: Sean Gallagher
Targeting new iPhone users to capture user credentials, monitors find.
...morePublished: 2019-03-08 00:49:38
Popularity: None
Author: Dan Goodin
Open source code also attacks devices connecting to wireless networks.
...morePublished: 2019-03-08 00:49:36
Popularity: None
Author: Dan Goodin
Bug in Android KeyStore that leaks credentials fixed only in KitKat.
...morePublished: 2019-03-08 00:48:57
Popularity: None
Author: Dan Goodin
In a first, one player got a monopoly of Bitcoin's total computational power.
...morePublished: 2019-03-08 00:48:31
Popularity: None
Author: Sean Gallagher
Patches for Shellshock alone won’t fix already-compromised systems.
...morePublished: 2019-03-08 00:47:12
Popularity: None
Author: Dan Goodin
Vulnerability one of nine critical weaknesses from lawful intercept provider.
...morePublished: 2019-03-08 00:47:02
Popularity: None
Author: Robert Lemos
With surveillance a worry, startups offer products to help users gain privacy.
...morePublished: 2019-03-08 00:46:38
Popularity: None
Author: Dan Goodin
Privilege escalation bug lets untrusted users wrest control of vulnerable systems.
...morePublished: 2019-03-08 00:46:15
Popularity: None
Author: Robert Lemos
The provider adds cookie-like tokens to alert advertisers to users’ interests.
...morePublished: 2019-03-08 00:46:05
Popularity: None
Author: Sean Gallagher
Is the Chinese government spying on Hong Kong protesters’ phones?
...morePublished: 2019-03-08 00:45:09
Popularity: None
Author: Robert Lemos
Google reveals features designed to make Android "Lollipop" more secure
...morePublished: 2019-03-08 00:44:40
Popularity: None
Author: David Kravets
Android is the "preferred platform" for terrorist groups, according to report.
...morePublished: 2019-03-08 00:44:38
Popularity: None
Author: Dan Goodin
Open source tool tests connections for crypto flaws.
...morePublished: 2019-03-08 00:44:10
Popularity: None
Author: Lee Hutchinson
CISO Alex Stamos announces change will go into effect in the fall.
...morePublished: 2019-03-08 00:43:34
Popularity: None
Author: Dan Goodin
Two-year hacking spree ransacked e-mail account belonging to chief of police.
...morePublished: 2019-03-08 00:42:03
Popularity: None
Author: Sean Gallagher
Mac.BackDoor.iWorm used Minecraft server subreddit for command and control.
...morePublished: 2019-03-08 00:41:37
Popularity: None
Author: Dan Goodin
Bug in crypto library strips away one of the Internet's most crucial protections.
...morePublished: 2019-03-08 00:41:36
Popularity: None
Author: Sean Gallagher
XKeyscore code for tracking Tor users also caught visitors to that website.
...morePublished: 2019-03-08 00:40:47
Popularity: None
Author: David Kravets
Drop boxes, secured or not, are all the post-Snowden rage and ripe for subpoenas.
...morePublished: 2019-03-08 00:40:33
Popularity: None
Author: Cyrus Farivar
Feds call it “twelve triple three”; whistleblower says it's the heart of the problem.
...morePublished: 2019-03-08 00:39:58
Popularity: None
Author: Peter Bright
Bug enables malicious sites to grab cookies, passwords from other sites.
...morePublished: 2019-03-08 00:38:45
Popularity: None
Author: Sean Gallagher
Alexander, other top officials discussed data destruction before it took place.
...morePublished: 2019-03-08 00:38:27
Popularity: None
Author: Sean Gallagher
Over 100,000 images from hacked app posted, raising child porn concerns.
...morePublished: 2019-03-08 00:38:26
Popularity: None
Author: Andrew Cunningham
Comparisons to Android's Intents only tell part of the story.
...morePublished: 2019-03-08 00:38:25
Popularity: None
Author: Robert Lemos
Mobile apps could gather sensitive information on other running applications.
...morePublished: 2019-03-08 00:37:59
Popularity: None
Author: Dan Goodin
Researchers devise stealthy attack that reprograms USB device firmware.
...morePublished: 2019-03-08 00:37:56
Popularity: None
Author: Dan Goodin
Adoption of poorly secured password managers opens a single point of failure.
...morePublished: 2019-03-08 00:37:54
Popularity: None
Author: Dan Goodin
Legitimate users caught in legal fire designed to take down botnets.
...morePublished: 2019-03-08 00:37:18
Popularity: None
Author: Dan Goodin
"Fake ID" exploits work because Android doesn't properly inspect certificates.
...morePublished: 2019-03-08 00:36:57
Popularity: None
Author: Sean Gallagher
Over-the-air hacks of BlackBerry, others fly under radar; tweet on Blackphone hack doesn't.
...morePublished: 2019-03-08 00:36:21
Popularity: None
Author: Sean Gallagher
Zimmermann’s Silent Circle working with Dutch telco to deliver encrypted calls.
...morePublished: 2019-03-08 00:36:14
Popularity: None
Author: Janus Kopfstein
Globe-spanning white hat network hacked for the Dalai Lama, inspired arms legislation.
...morePublished: 2019-03-08 00:36:12
Popularity: None
Author: Dan Goodin
Stripped down package means there will be three independent versions of OpenSSL.
...morePublished: 2019-03-08 00:35:47
Popularity: None
Author: Dan Goodin
Attack targeted "Tor hidden services" used to protect IDs of website operators.
...morePublished: 2019-03-08 00:33:33
Popularity: None
Author: Sean Gallagher
Pwnie Express’ latest penetration testing offerings step up the power.
...morePublished: 2019-03-08 00:33:10
Popularity: None
Author: Sean Gallagher
Proof-of-concept malware had encryption key in its code.
...morePublished: 2019-03-08 00:32:31
Popularity: None
Author: Sean Gallagher
Crafted Web requests may have caused servers to give up their locations.
...morePublished: 2019-03-08 00:32:25
Popularity: None
Author: Robert Lemos
Companies are spending more money to ensure legal data collection.
...morePublished: 2019-03-08 00:32:13
Popularity: None
Author: Dan Goodin
"Masque attack" could expose banking data, e-mails, and other sensitive data.
...morePublished: 2019-03-08 00:31:44
Popularity: None
Author: Dan Goodin
Attacks tied to gang that previously infected governments with highly advanced malware.
...morePublished: 2019-03-08 00:31:41
Popularity: None
Author: Sean Gallagher
NOAA shut down access to systems but failed to report intrusion for a month.
...morePublished: 2019-03-08 00:31:40
Popularity: None
Author: Dan Goodin
Microsoft phone coughs up cookies, but full compromise fails.
...morePublished: 2019-03-08 00:31:38
Popularity: None
Author: Megan Geuss
Sources tell WSJ that police are watching cell phones from the sky.
...morePublished: 2019-03-08 00:31:37
Popularity: None
Author: Dan Goodin
Near field communication exploits play starring role in hacking competition.
...morePublished: 2019-03-08 00:29:25
Popularity: None
Author: Dan Goodin
Bringing big database-driven sites to their knees just got a little easier.
...morePublished: 2019-03-08 00:29:18
Popularity: None
Author: Dan Goodin
Operation Torpedo relied on long-abandoned Metasploit Decloaking Engine.
...morePublished: 2019-03-08 00:28:22
Popularity: None
Author: Dan Goodin
Thunderstrike allows anyone with even brief access to install stealthy malware.
...morePublished: 2019-03-08 00:28:02
Popularity: None
Author: Sean Gallagher
Analysts point to at least six insiders; DDoSers say they gave passwords to GoP.
...morePublished: 2019-03-08 00:26:54
Popularity: None
Author: Dan Goodin
New bug haunting Linux could spark "a lot of collateral damage on the Internet."
...morePublished: 2019-03-08 00:26:38
Popularity: None
Author: Dan Goodin
"After a week, you might start to feel there is something wrong with your device."
...morePublished: 2019-03-08 00:26:29
Popularity: None
Author: Joe Mullin
Defense counters: "Keeping a journal? Does that sound like Dread Pirate Roberts?"
...morePublished: 2019-03-08 00:26:02
Popularity: None
Author: Dan Goodin
"Equation Group" ran the most advanced hacking operation ever uncovered.
...morePublished: 2019-03-08 00:25:58
Popularity: None
Author: Dan Goodin
Mystery solved after crackers find Arabic word that dogged Kaspersky for weeks.
...morePublished: 2019-03-08 00:25:00
Popularity: None
Author: Andrew Cunningham
Encrypted storage will only be required in "future versions of Android."
...morePublished: 2019-03-08 00:23:03
Popularity: None
Author: Nicholas Weaver
Unless you use Tor Browser Bundle for everything, you're going to be spied upon.
...morePublished: 2019-03-08 00:22:58
Popularity: None
Author: Dan Goodin
Two-year-old bug exposes thousands of servers to crippling attack.
...morePublished: 2019-03-08 00:22:56
Popularity: None
Author: Dan Goodin
Netflix move leaves Amazon as the most visible no-show to the Web crypto party.
...morePublished: 2019-03-08 00:22:15
Popularity: None
Author: Dan Goodin
Attack code exploiting virtualization flaw could be available soon, researcher says.
...morePublished: 2019-03-08 00:21:05
Popularity: None
Author: Dan Goodin
An estimated 630 million phones fail to purge contacts, e-mails, images, and more.
...morePublished: 2019-03-08 00:21:00
Popularity: None
Author: Dan Goodin
Diffie-Hellman downgrade weakness allows attackers to intercept encrypted data.
...morePublished: 2019-03-08 00:19:51
Popularity: None
Author: Dan Goodin
A comedy of programming errors could prove catastrophic for affected users.
...morePublished: 2019-03-08 00:19:42
Popularity: None
Author: Dan Goodin
Newly discovered iOS bug triggers wave of text messages that causes iDevice reboot.
...morePublished: 2019-03-08 00:19:00
Popularity: None
Author: Cyrus Farivar
Office of Personnel Management sustains its second hack in less than a year.
...morePublished: 2019-03-08 00:18:58
Popularity: None
Author: Sean Gallagher
The iPhone's auto-connection to WiFi could be used to social engineer users.
...morePublished: 2019-03-08 00:18:51
Popularity: None
Author: Sean Gallagher
Process changes are in store as the Senate scrambles to pass new legislation.
...morePublished: 2019-03-08 00:18:07
Popularity: None
Author: Sean Gallagher
Frozen sites' name servers were changed to a domain registered through Chinese company.
...morePublished: 2019-03-08 00:17:47
Popularity: None
Author: Dan Goodin
Users: Change your master password and enable 2-factor authentication immediately.
...morePublished: 2019-03-08 00:17:41
Popularity: None
Author: Dan Goodin
Researchers sneak password-stealing app into Apple Store to demonstrate threat.
...morePublished: 2019-03-08 00:17:18
Popularity: None
Author: Nathan Mattise
Phishing e-mails offered refurbished iMacs, instead delivered pwnage.
...morePublished: 2019-03-08 00:16:39
Popularity: None
Author: Dan Goodin
Hijacking was initiated after Italian Police lost control of infected machines.
...morePublished: 2019-03-08 00:16:32
Popularity: None
Author: Cyrus Farivar and Sean Gallagher
FBI seized server, let site run for two weeks before shutting it down.
...morePublished: 2019-03-08 00:16:23
Popularity: None
Author: Cyrus Farivar
Spyware vendor is also sad that no one in the media sees it as the real victim.
...morePublished: 2019-03-08 00:16:16
Popularity: None
Author: Cyrus Farivar
As surveillance startup's sales grew, so did internal strife at Hacking Team.
...morePublished: 2019-03-08 00:16:13
Popularity: None
Author: Dan Goodin
Incident proves buyers' can't be vetted for human rights and ethics, CEO says.
...morePublished: 2019-03-08 00:16:06
Popularity: None
Author: Sean Gallagher
Full backdoor code wasn't installed until after user activated app.
...morePublished: 2019-03-08 00:16:01
Popularity: None
Author: Cyrus Farivar
Leaked e-mails brag HT could see "who got that money (DEA: anyone interested? :P )"
...morePublished: 2019-03-08 00:15:55
Popularity: None
Author: Cyrus Farivar
Eric Rabe: "The company is certainly in operation. We have a lot of work to do."
...morePublished: 2019-03-08 00:15:46
Popularity: None
Author: Dan Goodin
Invoices purport to show Hacking Team doing business in Sudan and other rogue nations.
...morePublished: 2019-03-08 00:15:29
Popularity: None
Author: Dan Goodin
Latest critical bug in widely used DNS server underscores its fragility.
...morePublished: 2019-03-08 00:15:23
Popularity: None
Author: Dan Goodin
Deanonymization requires luck but nonetheless shows limits of Tor privacy.
...morePublished: 2019-03-08 00:15:12
Popularity: None
Author: Dan Goodin
Researchers perfect technique that profiles people based on unique keystroke traits.
...morePublished: 2019-03-08 00:15:05
Popularity: None
Author: Dan Goodin
Hacking Team code is the most professionally developed Android malware ever exposed.
...morePublished: 2019-03-08 00:14:14
Popularity: None
Author: Dan Goodin
No, electronicfrontierfoundation.org is not the EFF site you're looking for.
...morePublished: 2019-03-08 00:14:13
Popularity: None
Author: Dan Goodin
Noel Biderman steps down less than a week after gigabytes of his e-mail go public.
...morePublished: 2019-03-08 00:14:12
Popularity: None
Author: Dan Goodin
Vulnerability in open BitTorrent protocol amplified attacks as much as 120 times.
...morePublished: 2019-03-08 00:14:09
Popularity: None
Author: Dan Goodin
Agora dark market suspends operations after finding "suspicious activity."
...morePublished: 2019-03-08 00:14:04
Popularity: None
Author: Sean Gallagher
Good luck getting this one patched quickly and effectively.
...morePublished: 2019-03-08 00:13:43
Popularity: None
Author: Sean Gallagher
Open telnet port, open Wi-Fi, root access, open season.
...morePublished: 2019-03-08 00:13:25
Popularity: None
Author: Dan Goodin
Technique lets rogue apps ask for keychain access, then click OK.
...morePublished: 2019-03-08 00:13:22
Popularity: None
Author: Dan Goodin
Despite its ubiquity, Internet of Things security still isn't ready for prime time.
...morePublished: 2019-03-08 00:12:41
Popularity: None
Author: Sean Gallagher
School scores lowest among 485 colleges and universities in SecurityScorecard scan.
...morePublished: 2019-03-08 00:12:40
Popularity: None
Author: Dan Goodin
Top picks were . . . drum roll: "123456," "12345," "password," and "DEFAULT."
...morePublished: 2019-03-08 00:12:34
Popularity: None
Author: Dan Goodin
Infected owners must choose between paying $500 and performing factory reset.
...morePublished: 2019-03-08 00:12:30
Popularity: None
Author: Dan Goodin
Piggyback hack allowed Turla gang to conceal location of control servers.
...morePublished: 2019-03-08 00:12:27
Popularity: None
Author: Sean Gallagher
Microsoft research team points to CryptDB developers' own paper as proof.
...morePublished: 2019-03-08 00:12:23
Popularity: None
Author: Megan Geuss
A privileged user's account was compromised at least as early as September 2014.
...morePublished: 2019-03-08 00:12:19
Popularity: None
Author: Dan Goodin
Exploiting RSA implementation flaw allows attackers to impersonate HTTPS sites.
...morePublished: 2019-03-08 00:11:06
Popularity: None
Author: Dan Goodin
No, address randomization defense does not protect against stagefright exploits.
...morePublished: 2019-03-08 00:10:57
Popularity: None
Author: Dan Goodin
Lockscreen bug is fixed in latest Android build, but availability is spotty.
...morePublished: 2019-03-08 00:10:33
Popularity: None
Author: Dan Goodin
Unauthorized credential was trusted by all browsers, but Google never authorized it.
...morePublished: 2019-03-08 00:10:32
Popularity: None
Author: Dan Goodin
Outbreak may have caused hundreds of millions of people to download malicious apps.
...morePublished: 2019-03-08 00:09:39
Popularity: None
Author: Dan Goodin
Backdoor in Outlook Web Application operates inside target's firewall.
...morePublished: 2019-03-08 00:09:36
Popularity: None
Author: Dan Goodin
The inclusion of source code and databases suggests breach was extensive.
...morePublished: 2019-03-08 00:09:35
Popularity: None
Author: Dan Goodin
Stagefright 2.0 comes as Android users were still recovering from Stagefright 1.
...morePublished: 2019-03-08 00:09:25
Popularity: None
Author: Dan Goodin
Researchers warn widely used algorithm should be retired sooner.
...morePublished: 2019-03-08 00:09:07
Popularity: None
Author: Ron Amadeo
Study blames OEMs for a lack of updates; ranks Nexus devices as the most secure.
...morePublished: 2019-03-08 00:08:41
Popularity: None
Author: Dan Goodin
"Factorization as a service" in Amazon cloud is so easy novices can do it.
...morePublished: 2019-03-08 00:07:57
Popularity: None
Author: Dan Goodin
$1,400 device can track users for days with little indication anything is amiss.
...morePublished: 2019-03-08 00:07:45
Popularity: None
Author: Cyrus Farivar
Girl makes Diceware passwords, rolled with real dice, written by hand, sent by mail.
...morePublished: 2019-03-08 00:07:31
Popularity: None
Author: Megan Geuss
Over $680,000 stolen via a clever man-in-the-middle attack.
...morePublished: 2019-03-08 00:06:57
Popularity: None
Author: Jon Brodkin
Powered by radios in trees, homegrown network serves 50 houses on Orcas Island.
...morePublished: 2019-03-08 00:04:59
Popularity: None
Author: Dan Goodin
Privacy advocates warn feds about surreptitious cross-device tracking.
...morePublished: 2019-03-07 23:59:36
Popularity: None
Author: Dan Goodin
Hacked casino operator alleges breach continued while Trustwave was investigating.
...morePublished: 2019-03-07 23:59:28
Popularity: None
Author: J.M. Porup
Shodan search engine is only the latest reminder of why we need to fix IoT security.
...morePublished: 2019-03-07 23:59:21
Popularity: None
Author: Sean Gallagher
CBS endangered cyber-procedural: Plane hacking! Software defined radio! White noise! OMG!
...morePublished: 2019-03-07 23:58:54
Popularity: None
Author: Dan Goodin
Electricity Authority computers were paralyzed by attack and are still recovering.
...morePublished: 2019-03-07 23:57:58
Popularity: None
Author: Dan Goodin
World's most widely used Web server often displays geographic locations of Tor sites.
...morePublished: 2019-03-07 23:57:53
Popularity: None
Author: Dan Goodin
OpenSSL maintainers release update that fixes key-recovery bug. Patch now.
...morePublished: 2019-03-07 23:57:52
Popularity: None
Author: Peter Bright
It will be removed some time after the release of Java 9.
...morePublished: 2019-03-07 23:57:30
Popularity: None
Author: Kelly Fiveash
"We don't know motivation behind this," says distro creator.
...morePublished: 2019-03-07 23:57:06
Popularity: None
Author: Peter Bright
The browser is now hardened against some classic Windows security flaws.
...morePublished: 2019-03-07 23:56:59
Popularity: None
Author: Andrew Cunningham
New Fire tablets and old ones that were upgraded to Fire OS 5 can't be encrypted.
...morePublished: 2019-03-07 23:56:58
Popularity: None
Author: Dan Goodin
Researcher-devised exploit threatens Bitcoin wallets and other high-value assets.
...morePublished: 2019-03-07 23:56:57
Popularity: None
Author: Sean Gallagher
Gogo Wireless, other in-flight services can be even worse than the usual public Wi-Fi.
...morePublished: 2019-03-07 23:56:55
Popularity: None
Author: Dan Goodin
Low-cost DROWN attack decrypts data in hours, works against TLS e-mail servers, too.
...morePublished: 2019-03-07 23:56:54
Popularity: None
Author: Dan Goodin
Until recently, sample wasn't detected by any of the top antivirus programs.
...morePublished: 2019-03-07 23:56:52
Popularity: None
Author: Sean Gallagher
What's driving the surge in hidden services—is it government tampering?
...morePublished: 2019-03-07 23:56:28
Popularity: None
Author: Glyn Moody
"Everywhere they went, the attackers left behind their throwaway phones."
...morePublished: 2019-03-07 23:56:27
Popularity: None
Author: Sean Gallagher
Zdziarski believes NAND mirroring will give FBI the retries to crack PIN it needs.
...morePublished: 2019-03-07 23:56:14
Popularity: None
Author: Dan Goodin
Millions of other phones affected because Android never received 2014 Linux patch.
...morePublished: 2019-03-07 23:56:04
Popularity: None
Author: Dan Goodin
Since 2008, vulnerability has left apps and hardware open to remote hijacking.
...morePublished: 2019-03-07 23:56:00
Popularity: None
Author: Sean Gallagher
"Weev" sent print job to every visible printer in North America
...morePublished: 2019-03-07 23:55:56
Popularity: None
Author: Dan Goodin
Major security certification group ignored private warnings for more than 3 days.
...morePublished: 2019-03-07 23:55:28
Popularity: None
Author: Dan Goodin
SS7 routing protocol also exposes locations, contacts, and other sensitive data.
...morePublished: 2019-03-07 23:55:01
Popularity: None
Author: Dan Goodin
Approach relies on already installed code, including widely used glibc library.
...morePublished: 2019-03-07 23:54:37
Popularity: None
Author: Dan Goodin
Padding oracles and memory corruption threats caused by use of older schemes.
...morePublished: 2019-03-07 23:54:24
Popularity: None
Author: Andrii Degeler
Facebook pays out as part of its bug bounty program.
...morePublished: 2019-03-07 23:51:11
Popularity: None
Author: Peter Bright
Symantec becomes the second firm to link the hack to the Sony Pictures attack.
...morePublished: 2019-03-07 23:49:20
Popularity: None
Author: Sean Gallagher
The mobile device for the secure government set is now a "hardened" Samsung Galaxy S4.
...morePublished: 2019-03-07 23:48:48
Popularity: None
Author: Dan Goodin
Malware family packages a large number of exploits that give all-powerful root access.
...morePublished: 2019-03-07 23:46:38
Popularity: None
Author: Dan Goodin
"Pokemon Go Ultimate" requires battery removal or Device Manager to be uninstalled.
...morePublished: 2019-03-07 23:46:26
Popularity: None
Author: Dan Goodin
Critical vulnerability in all versions opens users to printer watering hole attacks.
...morePublished: 2019-03-07 23:46:24
Popularity: None
Author: Sean Gallagher
Layoffs, legal disputes, and a major OS update shuffle the deck for privacy-focused phone.
...morePublished: 2019-03-07 23:46:16
Popularity: None
Author: Andrew Cunningham
No user data has been accessed, and Google and Niantic are working on fixes.
...morePublished: 2019-03-07 23:45:23
Popularity: None
Author: Dan Goodin
"Introspection Engine" might one day work with wide variety of smartphones.
...morePublished: 2019-03-07 23:45:17
Popularity: None
Author: Dan Goodin
Misbehaving hidden service directories are scattered around the world.
...morePublished: 2019-03-07 23:44:14
Popularity: None
Author: Cyrus Farivar
Going forward, group will now have a new anti-harassment policy, among other changes.
...morePublished: 2019-03-07 23:41:50
Popularity: None
Author: Dan Goodin
Approach exploits how HTTPS responses are delivered over transmission control protocol.
...morePublished: 2019-03-07 23:41:12
Popularity: None
Author: Jonathan M. Gitlin
It's not easy, but it is possible.
...morePublished: 2019-03-07 23:41:10
Popularity: None
Author: Dan Goodin
"DiskFiltration" siphons data even when computers are disconnected from the Internet.
...morePublished: 2019-03-07 23:41:03
Popularity: None
Author: Dan Goodin
Trove includes home and cell phone numbers, e-mail addresses and some home addresses.
...morePublished: 2019-03-07 23:41:02
Popularity: None
Author: Dan Goodin
"Off-path" attack means hackers can be anywhere with no man-in-the-middle needed.
...morePublished: 2019-03-07 23:40:58
Popularity: None
Author: J.M. Porup
A multi-billion-dollar megacorp, Google, apparently needs help to secure its OS.
...morePublished: 2019-03-07 23:39:57
Popularity: None
Author: Dan Goodin
Exploit against Cisco's PIX line of firewalls remotely extracted crypto keys.
...morePublished: 2019-03-07 23:39:20
Popularity: None
Author: Andrew Cunningham
"Trident" vulnerabilities were used to target a human rights activist.
...morePublished: 2019-03-07 23:39:20
Popularity: None
Author: Tom Mendelsohn
Naked photos seemingly taken from actor's iCloud account allegedly posted online.
...morePublished: 2019-03-07 23:37:46
Popularity: None
Author: Tom Mendelsohn
"Scope of password reset completed last week protected all impacted users," says Dropbox.
...morePublished: 2019-03-07 23:37:40
Popularity: None
Author: Dan Goodin
Technique works on virtually all USB drives with no modifications necessary.
...morePublished: 2019-03-07 23:37:12
Popularity: None
Author: Dan Goodin
20 seconds of physical access with a $50 device is all it takes.
...morePublished: 2019-03-07 23:37:01
Popularity: None
Author: Dan Goodin
Google releases fixes for newer devices and ejects apps following reports.
...morePublished: 2019-03-07 23:36:26
Popularity: None
Author: Sean Gallagher
Jacob Ajit got free Web access just by putting "/speedtest" into a proxy site's address.
...morePublished: 2019-03-07 23:36:16
Popularity: None
Author: Dan Goodin
The curious case of Firefox's (now fixed) certificate pinning failure.
...morePublished: 2019-03-07 23:35:31
Popularity: None
Author: Sean Gallagher
Project Springfield, Microsoft's "million-dollar bug detector" now available in cloud.
...morePublished: 2019-03-07 23:33:40
Popularity: None
Author: Dan Goodin
Once unthinkable, 1 terabit attacks may soon be the new normal.
...morePublished: 2019-03-07 23:33:36
Popularity: None
Author: Dan Goodin
Zerodium triples price for iOS exploits, doubles Android bounties to $200,000.
...morePublished: 2019-03-07 23:32:26
Popularity: None
Author: Sean Gallagher
Unisphere for VMAX used insecured Flash-to-Java interfaces, leaving door open to attacks.
...morePublished: 2019-03-07 23:32:08
Popularity: None
Author: Dan Goodin
Technique allows attackers to passively decrypt Diffie-Hellman protected data.
...morePublished: 2019-03-07 23:32:03
Popularity: None
Author: Cyrus Farivar
Ars examines the two leading candidates' positions on crypto and Snowden.
...morePublished: 2019-03-07 23:31:49
Popularity: None
Author: Dan Goodin
Lurking in the kernel for nine years, flaw gives untrusted users unfettered root access.
...morePublished: 2019-03-07 23:31:10
Popularity: None
Author: Megan Geuss
Ryan Collins sent fake e-mails that appeared to be from Apple and Google.
...morePublished: 2019-03-07 23:30:19
Popularity: None
Author: Dan Goodin
Shadow Brokers identifies hundreds of organizations it claims were hacked by NSA.
...morePublished: 2019-03-07 23:30:17
Popularity: None
Author: Sean Gallagher
Microsoft threat teams tied use of bug to APT28, aka "Fancy Bear"
...morePublished: 2019-03-07 23:30:13
Popularity: None
Author: Lily Hay Newman, wired.com
Your phone can talk to advertisers beyond your back, beyond your audible spectrum.
...morePublished: 2019-03-07 23:29:54
Popularity: None
Author: Cyrus Farivar
Researcher: FBI was likely enabled to run half of all child porn sites on the servers.
...morePublished: 2019-03-07 23:29:36
Popularity: None
Author: Dan Goodin
The perils of leaving computers unattended is about to get worse.
...morePublished: 2019-03-07 23:29:07
Popularity: None
Author: Dan Goodin
Firmware that actively tries to hide itself allows attackers to install apps as root.
...morePublished: 2019-03-07 23:28:11
Popularity: None
Author: J.M. Porup
An Android phone hardened for privacy and security that plays Google at its own game.
...morePublished: 2019-03-07 23:27:40
Popularity: None
Author: Sean Gallagher
Backups meant SFMTA didn't have to pay 100-Bitcoin ransom demanded by the attacker.
...morePublished: 2019-03-07 23:26:46
Popularity: None
Author: Dan Goodin
For six months, the remote management app has opened users to code-execution attacks.
...morePublished: 2019-03-07 23:26:45
Popularity: None
Author: Dan Goodin
Critical code-execution flaw resides in Windows, Mac, and Linux. Patch now.
...morePublished: 2019-03-07 23:26:19
Popularity: None
Author: Sean Gallagher
That's a billion with a b—and is separate from the breach "cleared" in September.
...morePublished: 2019-03-07 23:26:08
Popularity: None
Author: Filippo Valsorda
“If you need to securely contact me... DM me asking for my Signal number.”
...morePublished: 2019-03-07 23:26:06
Popularity: None
Author: Cyrus Farivar
Megaupload founder promises new appeal in case that's dragged on for nearly 4 years.
...morePublished: 2019-03-07 23:25:36
Popularity: None
Author: Dan Goodin
Privacy-preserving “cryptographic assertions” are impossible to guess or phish.
...morePublished: 2019-03-07 23:25:23
Popularity: None
Author: Sean Gallagher
Russian hackers part of broader campaign against West, German intel chief warns.
...morePublished: 2019-03-07 23:25:03
Popularity: None
Author: Sean Gallagher
Intelligence dump from DHS and FBI bolsters claims of Russian election interference.
...morePublished: 2019-03-07 23:24:01
Popularity: None
Author: Dan Goodin
With 8 days before inauguration of Donald Trump, leak is sure to inflame US officials.
...morePublished: 2019-03-07 23:23:52
Popularity: None
Author: Dan Goodin
For the second year in a row, hack targets Ukraine during one of its coldest months.
...morePublished: 2019-03-07 23:22:48
Popularity: None
Author: Sebastian Anthony
Update your software and OS regularly instead, practice skeptical computing.
...morePublished: 2019-03-07 23:21:11
Popularity: None
Author: Andrew Cunningham
Previous reports said Trump had exchanged the phone for a locked-down model.
...morePublished: 2019-03-07 23:21:09
Popularity: None
Author: Dan Goodin
Publicly known “magic string” lets any site run malicious code, no questions asked.
...morePublished: 2019-03-07 23:21:08
Popularity: None
Author: Dan Goodin
HummingWhale is back with new tricks, including a way to gin user ratings.
...morePublished: 2019-03-07 23:20:49
Popularity: None
Author: Dan Goodin
Prosecutors reportedly plan to charge Harold T. Martin with espionage.
...morePublished: 2019-03-07 23:20:48
Popularity: None
Author: Dan Goodin
Online tracking gets more accurate and harder to evade.
...morePublished: 2019-03-07 23:20:29
Popularity: None
Author: Dan Goodin
If you use NextGEN Gallery, now would be a good time to update.
...morePublished: 2019-03-07 23:20:28
Popularity: None
Author: Dan Goodin
String of unpatched security flaws comes after February Patch Tuesday was canceled.
...morePublished: 2019-03-07 23:19:52
Popularity: None
Author: Dan Goodin
Critical infrastructure, media, and scientists targeted by suspected nation-state.
...morePublished: 2019-03-07 23:19:34
Popularity: None
Author: Cyrus Farivar
Encrypted messaging app gains new currency under the Trump administration.
...morePublished: 2019-03-07 23:19:23
Popularity: None
Author: Dan Goodin
A property found in virtually all modern CPUs neuters decade-old security protection.
...morePublished: 2019-03-07 23:19:17
Popularity: None
Author: Dan Goodin
Company knocks $350 million off its purchase price.
...morePublished: 2019-03-07 23:18:58
Popularity: None
Author: Sean Gallagher
"Pro_Mast3r" takes over server associated with campaign donations.
...morePublished: 2019-03-07 23:18:43
Popularity: None
Author: Dan Goodin
Xagent for Macs steals passwords, grabs screenshots, and exfiltrates iPhone backups.
...morePublished: 2019-03-07 23:17:39
Popularity: None
Author: Dan Goodin
Algorithm underpinning Internet security falls to first-known collision attack.
...morePublished: 2019-03-07 23:17:13
Popularity: None
Author: Sean Gallagher
Rep. Ted Lieu and others ask Chaffetz and Cummings to look into "troubling reports."
...morePublished: 2019-03-07 23:17:06
Popularity: None
Author: Janus Kopfstein
Globe-spanning white hat network hacked for the Dalai Lama, inspired arms legislation.
...morePublished: 2019-03-07 23:16:59
Popularity: None
Author: Dan Goodin
"Fake ID" exploits work because Android doesn't properly inspect certificates.
...morePublished: 2019-03-07 23:16:57
Popularity: None
Author: Sebastian Anthony
Plus a new, stealthy "anonymous" stick, because that's what the world really needed.
...morePublished: 2019-03-07 23:16:56
Popularity: None
Author: Sean Gallagher
Over 100,000 images from hacked app posted, raising child porn concerns.
...morePublished: 2019-03-07 23:16:41
Popularity: None
Author: Dan Goodin
Researchers devise stealthy attack that reprograms USB device firmware.
...morePublished: 2019-03-07 23:16:25
Popularity: None
Author: Sean Gallagher
Pwnie Express’ latest penetration testing offerings step up the power.
...morePublished: 2019-03-07 23:16:24
Popularity: None
Author: Cyrus Farivar
Feds call it “twelve triple three”; whistleblower says it's the heart of the problem.
...morePublished: 2019-03-07 23:16:01
Popularity: None
Author: Robert Lemos
With surveillance a worry, startups offer products to help users gain privacy.
...morePublished: 2019-03-07 23:16:00
Popularity: None
Author: David Kravets
Android is the "preferred platform" for terrorist groups, according to report.
...morePublished: 2019-03-07 23:15:32
Popularity: None
Author: Sean Gallagher
Alexander, other top officials discussed data destruction before it took place.
...morePublished: 2019-03-07 23:14:49
Popularity: None
Author: Sean Gallagher
Over-the-air hacks of BlackBerry, others fly under radar; tweet on Blackphone hack doesn't.
...morePublished: 2019-03-07 23:14:36
Popularity: None
Author: Sean Gallagher
Proof-of-concept malware had encryption key in its code.
...morePublished: 2019-03-07 23:14:29
Popularity: None
Author: Dan Goodin
Stripped down package means there will be three independent versions of OpenSSL.
...morePublished: 2019-03-07 23:14:27
Popularity: None
Author: Sean Gallagher
XKeyscore code for tracking Tor users also caught visitors to that website.
...morePublished: 2019-03-07 23:14:20
Popularity: None
Author: Dan Goodin
In a first, one player got a monopoly of Bitcoin's total computational power.
...morePublished: 2019-03-07 23:14:19
Popularity: None
Author: None
Internet surveillance gets 30 minutes on Morning Edition.
...morePublished: 2019-03-07 23:14:10
Popularity: None
Author: Sean Gallagher
A week spent playing NSA reveals just how much data we leak online.
...morePublished: 2019-03-07 23:13:52
Popularity: None
Author: Dan Goodin
Vulnerability one of nine critical weaknesses from lawful intercept provider.
...morePublished: 2019-03-07 23:13:46
Popularity: None
Author: Robert Lemos
Mobile apps could gather sensitive information on other running applications.
...morePublished: 2019-03-07 23:13:27
Popularity: None
Author: Dan Goodin
Google Play crawler uncovers secret tokens to Facebook, Twitter, and AWS.
...morePublished: 2019-03-07 23:13:03
Popularity: None
Author: Dan Goodin
Privilege escalation bug lets untrusted users wrest control of vulnerable systems.
...morePublished: 2019-03-07 23:12:47
Popularity: None
Author: Dan Goodin
Two-year hacking spree ransacked e-mail account belonging to chief of police.
...morePublished: 2019-03-07 23:12:40
Popularity: None
Author: Dan Goodin
Bug in crypto library strips away one of the Internet's most crucial protections.
...morePublished: 2019-03-07 23:12:34
Popularity: None
Author: David Kravets
Drop boxes, secured or not, are all the post-Snowden rage and ripe for subpoenas.
...morePublished: 2019-03-07 23:12:09
Popularity: None
Author: Sean Gallagher
Wikileaks claims CIA can defeat WhatsApp, Signal, Telegram, other apps' encryption by hacking phones.
...morePublished: 2019-03-07 23:11:57
Popularity: None
Author: Dan Goodin
Exploits for easy-to-spot bug are trivial, reliable, and publicly available.
...morePublished: 2019-03-07 23:11:41
Popularity: None
Author: Sean Gallagher
Mayer will leave as what remains of Yahoo becomes Altaba holding company.
...morePublished: 2019-03-07 23:11:32
Popularity: None
Author: Dan Goodin
As a candidate, Trump VP castigated Clinton for use of a private e-mail server.
...morePublished: 2019-03-07 23:11:11
Popularity: None
Author: Sean Gallagher
Unwitting sysadmin or other employee was conned out of credentials, FBI theorizes.
...morePublished: 2019-03-07 23:11:00
Popularity: None
Author: Dan Goodin
Hackers are still exploiting the bug to install malware on high-impact sites.
...morePublished: 2019-03-07 23:10:50
Popularity: None
Author: Dan Goodin
Sorry! That’s a feature not a bug.
...morePublished: 2019-03-07 23:09:52
Popularity: None
Author: Dan Goodin
Chrome to immediately stop recognizing EV status and gradually nullify all certs.
...morePublished: 2019-03-07 23:09:34
Popularity: None
Author: Sean Gallagher
"Sonic Screwdriver" leveraged a now-patched vulnerability.
...morePublished: 2019-03-07 23:09:30
Popularity: None
Author: Dan Goodin
Only an estimated 6% of Android phones randomize MACs, and they do it poorly.
...morePublished: 2019-03-07 23:07:52
Popularity: None
Author: Dan Goodin
Demo exploit is inexpensive, remote, scalable—and opens door to more advanced hacks.
...morePublished: 2019-03-07 23:07:22
Popularity: None
Author: Sean Gallagher
Startup tells customer “Your unit will be denied server connection.”
...morePublished: 2019-03-07 23:07:21
Popularity: None
Author: Dan Goodin
Ongoing "BrickerBot" attacks might be trying to kill devices before they can join a botnet.
...morePublished: 2019-03-07 23:07:16
Popularity: None
Author: Andrew Cunningham
Twice the normal volume of 911 calls came into the system early Saturday morning.
...morePublished: 2019-03-07 23:07:10
Popularity: None
Author: Dan Goodin
WikiLeaks dump identical to operation that has been hacking governments since 2011.
...morePublished: 2019-03-07 23:06:51
Popularity: None
Author: Dan Goodin
Microsoft fixed critical vulnerabilities in uncredited update released in March.
...morePublished: 2019-03-07 23:06:37
Popularity: None
Author: Sean Gallagher
Senate employees just use passwords, and their badges sport a picture of an alternative.
...morePublished: 2019-03-07 23:06:28
Popularity: None
Author: Cyrus Farivar
Confide: "The accusations set forth in the complaint are unfounded and without merit."
...morePublished: 2019-03-07 23:05:15
Popularity: None
Author: Dan Goodin
Greyhound allows four-digit PINs and stores them in plaintext.
...morePublished: 2019-03-07 23:05:09
Popularity: None
Author: Sean Gallagher
Breach of post-production company poses potential threat to many networks' shows.
...morePublished: 2019-03-07 23:05:02
Popularity: None
Author: Jon Brodkin
ISPs would gain the freedom to block and throttle websites and applications.
...morePublished: 2019-03-07 23:04:15
Popularity: None
Author: Ron Amadeo
You really think someone would just go on the Internet and tell lies?
...morePublished: 2019-03-07 23:04:13
Popularity: None
Author: Sean Gallagher
An e-mail disguised as a Google Docs share is ingenious bit of malicious phishing.
...morePublished: 2019-03-07 23:04:08
Popularity: None
Author: Dan Goodin
The same weakness could be used to eavesdrop on calls and track users’ locations.
...morePublished: 2019-03-07 23:03:40
Popularity: None
Author: Ron Amadeo
Taking a look at Google's mysterious third operating system.
...morePublished: 2019-03-07 23:03:09
Popularity: None
Author: Dan Goodin
Company president specifically notes role of NSA code used by Ransomware worm.
...morePublished: 2019-03-07 23:02:54
Popularity: None
Author: Joe Mullin
Trump shared classified info with Russians, so EU officials want more info, too.
...morePublished: 2019-03-07 23:02:00
Popularity: None
Author: Sean Gallagher
Trump retired his trademark Samsung device in March after taunting Schwarzenegger.
...morePublished: 2019-03-07 23:01:59
Popularity: None
Author: Dan Goodin
Yahoo promptly retired ImageMagic library after failing to install 2-year-old patch.
...morePublished: 2019-03-07 23:01:58
Popularity: None
Author: Sean Gallagher
Trump’s cybersecurity order cribs from his predecessor, despite campaign bluster.
...morePublished: 2019-03-07 23:01:57
Popularity: None
Author: Sean Gallagher
Digital team filled fake accounts with garbage data to slow information operation.
...morePublished: 2019-03-07 23:01:55
Popularity: None
Author: Sebastian Anthony
PCs can be compromised when Defender scans an e-mail or IM; patch has been issued.
...morePublished: 2019-03-07 23:00:11
Popularity: None
Author: Dan Goodin
Latest Vault7 release exposes network-spying operation CIA kept secret since 2007.
...morePublished: 2019-03-07 22:59:57
Popularity: None
Author: Dan Goodin
Is there a fuzzer in the house?
...morePublished: 2019-03-07 22:58:04
Popularity: None
Author: Jon Brodkin
Records request denied because FCC made no "written documentation" of attack.
...morePublished: 2019-03-07 22:54:48
Popularity: None
Author: Mark Walton
Cheaper, faster, and more feature-rich than Skylake-X—what's not to love?
...morePublished: 2019-03-07 22:54:32
Popularity: None
Author: Dan Goodin
Compromised accounts push fraudulent extension updates to unsuspecting users.
...morePublished: 2019-03-07 22:54:29
Popularity: None
Author: Dan Goodin
Fancy Bear used Eternal Blue 3 months after it was leaked by a mysterious group.
...morePublished: 2019-03-07 22:52:04
Popularity: None
Author: Ron Amadeo
Awkward ergonomics means Face ID will never be faster than a fingerprint sensor.
...morePublished: 2019-03-07 22:51:55
Popularity: None
Author: Joe Mullin
Kaspersky: We have “never helped, nor will help, any government with cyberespionage.”
...morePublished: 2019-03-07 22:51:23
Popularity: None
Author: None
The iPhone maker says its new face unlocking tech worked as intended.
...morePublished: 2019-03-07 22:49:16
Popularity: None
Author: Ron Amadeo
Linux kernel lifecycle tripled to match the realities of hardware development.
...morePublished: 2019-03-07 22:44:16
Popularity: None
Author: Dan Goodin
TorMoil threatens Mac and Linux versions of Tor browser; Windows and Tails not affected.
...morePublished: 2019-03-07 22:42:57
Popularity: None
Author: Peter Bright
It's as much as twice as fast as it was a year ago.
...morePublished: 2019-03-07 22:41:54
Popularity: None
Author: Sean Gallagher
Millions of computers could be remotely hijacked through bug in firmware code.
...morePublished: 2019-03-07 22:39:35
Popularity: None
Author: Dan Goodin
There's no online update mechanism for defective electronic safe.
...morePublished: 2019-03-07 22:39:29
Popularity: None
Author: Dan Goodin
Andromeda kingpin is identified by his ICQ number.
...morePublished: 2019-03-07 22:39:26
Popularity: None
Author: Dan Goodin
Previously undetected MoneyTaker gang is likely to strike again.
...morePublished: 2019-03-07 22:39:24
Popularity: None
Author: Dan Goodin
Previously undetected MoneyTaker gang is likely to strike again.
...morePublished: 2019-03-07 22:39:09
Popularity: None
Author: Dan Goodin
How extended validation certificates can be used to scam, not help, end users.
...morePublished: 2019-03-07 22:37:51
Popularity: None
Author: Timothy B. Lee
"Blockchain technologies are creating a fundamental paradigm shift," company says.
...morePublished: 2019-03-07 22:37:39
Popularity: None
Author: Peter Bright
And the built-in protection against this technique doesn’t work on all hardware.
...morePublished: 2019-03-07 22:37:34
Popularity: None
Author: Peter Bright
Bit by bit, the PC world is continuing to drop its legacy support.
...morePublished: 2019-03-07 22:35:25
Popularity: None
Author: Peter Bright
It’ll use the Signal protocol, also used in WhatsApp, Facebook Messenger, and others.
...morePublished: 2019-03-07 22:35:10
Popularity: None
Author: Dan Goodin
“Low complexity” hack for Transmission client may work against other clients, too.
...morePublished: 2019-03-07 22:34:59
Popularity: None
Author: Dan Goodin
Skygofree is among the most powerful spy platforms ever created for Android.
...morePublished: 2019-03-07 22:34:55
Popularity: None
Author: Dan Goodin
Google removes four extensions that used infected computers in click fraud scheme.
...morePublished: 2019-03-07 22:33:48
Popularity: None
Author: Ron Amadeo
It’s a “cybersecurity intelligence platform” powered by Alphabet’s servers.
...morePublished: 2019-03-07 22:33:09
Popularity: None
Author: Peter Bright
Registry keys can also be used to selectively enable or disable the microcode fix.
...morePublished: 2019-03-07 22:32:23
Popularity: None
Author: Dan Goodin
Adobe plans to have a fix for the critical flaw next week.
...morePublished: 2019-03-07 22:32:07
Popularity: None
Author: Peter Bright
Previous microcode update was reported to cause unwanted system reboots.
...morePublished: 2019-03-07 22:32:06
Popularity: None
Author: Peter Bright
The "Not secure" label will go where the padlock would go for an encrypted connection.
...morePublished: 2019-03-07 22:31:56
Popularity: None
Author: Sean Gallagher
Malware showed knowledge of Olympic networks' structure—and users.
...morePublished: 2019-03-07 22:31:17
Popularity: None
Author: Jon Brodkin
Bitcoin miner generated spurious emissions in 700MHz, disrupting T-Mobile LTE.
...morePublished: 2019-03-07 22:30:33
Popularity: None
Author: Dan Goodin
Crooks find poorly secured access credentials, use them to install stealth miner.
...morePublished: 2019-03-07 22:29:59
Popularity: None
Author: Dan Goodin
Full-featured trojan catered to password thieves, Peeping Toms, and ransomware scammers.
...morePublished: 2019-03-07 22:29:55
Popularity: None
Author: Jon Brodkin
IG examines whether Pai "improperly coordinated with Sinclair" on rule changes.
...morePublished: 2019-03-07 22:29:41
Popularity: None
Author: Dan Goodin
Flap that goes public renews troubling questions about issuance of certificates.
...morePublished: 2019-03-07 22:28:48
Popularity: None
Author: Peter Bright
Windows users will no longer be beholden to their motherboard makers.
...morePublished: 2019-03-07 22:27:50
Popularity: None
Author: Peter Bright
All bugs require administrative access to exploit.
...morePublished: 2019-03-07 22:27:38
Popularity: None
Author: Ron Amadeo
Custom ROM users get a way out, but noobs with pirated apps will be out of luck.
...morePublished: 2019-03-07 22:26:03
Popularity: None
Author: Peter Bright
New attack focuses on a different part of the branch prediction system.
...morePublished: 2019-03-07 22:25:45
Popularity: None
Author: Peter Bright
Microsoft, Mozilla, and Google are all implementing the new standard.
...morePublished: 2019-03-07 22:25:33
Popularity: None
Author: Peter Bright
Systems will still need updated firmware to get the latest microcode, however.
...morePublished: 2019-03-07 22:25:19
Popularity: None
Author: Dan Goodin
Bug patched in March is still being exploited to take full control of servers.
...morePublished: 2019-03-07 22:25:18
Popularity: None
Author: Sean Gallagher
RSA Conference attendee contact data extracted using hard-coded API data.
...morePublished: 2019-03-07 22:24:59
Popularity: None
Author: Dan Goodin
Almost 1,300 addresses for Amazon Route 53 rerouted for two hours.
...morePublished: 2019-03-07 22:23:32
Popularity: None
Author: Jon Brodkin
Bill is moving through Calif. Senate and will be submitted in NY legislature.
...morePublished: 2019-03-07 22:23:18
Popularity: None
Author: Dan Goodin
JavaScript based GLitch pwns browsers by flipping bits inside memory chips.
...morePublished: 2019-03-07 22:22:36
Popularity: None
Author: Dan Goodin
The bar for exploiting potentially serious DDR weakness keeps getting lower.
...morePublished: 2019-03-07 22:21:41
Popularity: None
Author: Timothy B. Lee
Bitcoin could consume 7.7 gigawatts by the end of 2018.
...morePublished: 2019-03-07 22:21:38
Popularity: None
Author: Dan Goodin
Easily found bug in free demo let visitors track phones from four top US carriers.
...morePublished: 2019-03-07 22:21:29
Popularity: None
Author: Dan Goodin
VPNFilter can survive reboots and contains destructive "kill" function.
...morePublished: 2019-03-07 22:20:08
Popularity: None
Author: Peter Bright
New memory offers huge capacities and persistence, but fits in a DDR4 slot.
...morePublished: 2019-03-07 22:20:00
Popularity: None
Author: Dan Goodin
Cutting-edge hack exploited newly added graphics feature until it was patched.
...morePublished: 2019-03-07 22:19:45
Popularity: None
Author: Dan Goodin
Coming: FaceTime encryption, protected cam access, and, possibly, USB Restricted Mode.
...morePublished: 2019-03-07 22:18:43
Popularity: None
Author: Dan Goodin
17 images posted by a single account over 10 months may have generated $90,000.
...morePublished: 2019-03-07 22:18:37
Popularity: None
Author: Dan Goodin
SigSpoof flaw fixed in GnuPG, Enigmail, GPGTools, and python-gnupg.
...morePublished: 2019-03-07 22:16:50
Popularity: None
Author: Dan Goodin
This isn't the IP camera software you think it is.
...morePublished: 2019-03-07 22:15:38
Popularity: None
Author: Peter Bright
It's no longer necessary to run attacker code on the victim system.
...morePublished: 2019-03-07 22:14:46
Popularity: None
Author: Peter Bright
Apps will be run in a virtual machine that's discarded after use.
...morePublished: 2019-03-07 22:13:35
Popularity: None
Author: Peter Bright
Speculative execution attacks truly are the gift that keeps on giving.
...morePublished: 2019-03-07 22:13:04
Popularity: None
Author: Peter Bright
Flash will have to be enabled every time a site tries to use it.
...morePublished: 2019-03-07 22:11:35
Popularity: None
Author: Jon Brodkin
"I will find your children and kill them," man wrote after net neutrality repeal.
...morePublished: 2019-03-07 22:10:27
Popularity: None
Author: Peter Bright
Privacy-conscious users were unhappy at being signed in to browser without consent.
...morePublished: 2019-03-07 22:10:17
Popularity: None
Author: Peter Bright
Phone-based authentication is the way forward instead.
...morePublished: 2019-03-07 22:09:52
Popularity: None
Author: Sam Machkovech
Dept's video includes guns-drawn response to hoax call, "sounds... like swatting to me."
...morePublished: 2019-03-07 22:09:34
Popularity: None
Author: Mark Harris
Eric Swildens had no dog in the fight other than intellectual curiosity.
...morePublished: 2019-03-07 22:09:28
Popularity: None
Author: Jon Brodkin
Top broadband lobby groups sue California, claim net neutrality law is illegal.
...morePublished: 2019-03-07 22:09:13
Popularity: None
Author: Peter Bright
Company plans stricter rules for developers and greater control for users.
...morePublished: 2019-03-07 22:07:54
Popularity: None
Author: Peter Bright
Almost everyone has now migrated to TLS 1.2, and a few have moved to TLS 1.3.
...morePublished: 2019-03-07 22:07:43
Popularity: None
Author: Dan Goodin
Fee-based service couples the security of a private server with the reliability of the cloud.
...morePublished: 2019-03-07 22:06:40
Popularity: None
Author: Peter Bright
And on GitHub there's a proof-of-concept that'll render your system unbootable.
...morePublished: 2019-03-07 22:06:28
Popularity: None
Author: Dan Goodin
Just-announced beta seals sender details inside encrypted envelope.
...morePublished: 2019-03-07 22:05:57
Popularity: None
Author: Dan Goodin
Side-channel leak in Skylake and Kaby Lake chips probably affects AMD CPUs, too.
...morePublished: 2019-03-07 22:05:28
Popularity: None
Author: Dan Goodin
Google says it doesn't believe leak was malicious despite suspicious appearances.
...morePublished: 2019-03-07 22:04:07
Popularity: None
Author: Dan Goodin
Years-old UPnP vulnerability being used to expose ports 139 and 445.
...morePublished: 2019-03-07 22:03:24
Popularity: None
Author: Ron Amadeo
Quintuple-app strategy offers "a simpler and more unified communications experience."
...morePublished: 2019-03-07 21:59:39
Popularity: None
Author: Peter Bright
Up to three years of paid support will be available after the cut-off.
...morePublished: 2019-03-07 21:59:02
Popularity: None
Author: Dan Goodin
Pear.php.net shuts down after maintainers discover serious supply-chain attack.
...morePublished: 2019-03-07 21:58:46
Popularity: None
Author: Peter Bright
Will these people never learn?
...morePublished: 2019-03-07 21:57:31
Popularity: None
Author: Dan Goodin
IE info bug was under active exploit; exploit code for Exchange flaw was circulating.
...morePublished: 2019-03-07 21:57:22
Popularity: None
Author: Peter Bright
Microsoft is phasing out SHA-1 hashes on its patches.
...morePublished: 2019-03-07 21:56:53
Popularity: None
Author: Jim Salter
"It's ridiculous vendors are replying to researchers via general counsel, not bug bounty."
...morePublished: 2024-05-18 12:29:43
Popularity: None
Author: Dan Goodin
Ebury backdoors SSH servers in hosting providers, giving the malware extraordinary reach.
...morePublished: 2024-05-21 23:02:11
Popularity: None
Author: Dan Goodin
Ebury backdoors SSH servers in hosting providers, giving the malware extraordinary reach.
...morePublished: 2024-09-24 23:37:24
Popularity: None
Author: Dan Goodin
Emails, documents, and other untrusted content can plant malicious memories.
...more