Summary

Total Articles Found: 88

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • Silkworm security? Researchers create new authentication method using silk fibers | ZDNet
  • JFrog researchers find JNDI vulnerability in H2 database consoles similar to Log4Shell | ZDNet
  • YubiKey Bio builds biometric authentication into a security key | ZDNet
  • Hackers exploit websites to give them excellent SEO before deploying malware | ZDNet
  • Plex Media servers are being abused for DDoS attacks | ZDNet
  • New side-channel attack can recover encryption keys from Google Titan security keys | ZDNet
  • Critical privilege escalation bugs squashed in WordPress Ultimate Member plugin | ZDNet
  • Google warns of severe 'BleedingTooth' Bluetooth flaw in Linux kernel | ZDNet
  • Hacker breaches security firm in act of revenge | ZDNet
  • Apple strong-arms entire CA industry into one-year certificate lifespans | ZDNet

Silkworm security? Researchers create new authentication method using silk fibers | ZDNet

Published: 2022-01-31 00:41:11

Popularity: None

Author: Charlie Osborne

🤖: "Sneaky threads"

Academics say the material could be used to create unclonable physical components suitable for supporting digital security.

...more

JFrog researchers find JNDI vulnerability in H2 database consoles similar to Log4Shell | ZDNet

Published: 2022-01-07 20:48:55

Popularity: None

Author: Jonathan Greig

🤖: "Exploitable vulnerability"

JFrog's senior director of security research said the vulnerability has a root cause similar to Log4Shell​.

...more

YubiKey Bio builds biometric authentication into a security key | ZDNet

Published: 2021-10-05 20:20:10

Popularity: None

Author: Adrian Kingsley-Hughes

🤖: ""Fingerprint fail""

The new YubiKey Bio brings a passwordless world one step closer.

...more

Hackers exploit websites to give them excellent SEO before deploying malware | ZDNet

Published: 2021-03-01 16:09:31

Popularity: None

Author: Charlie Osborne

🤖: "SEO hack fail"

Climbing up Google’s ranks is key to this new technique.

...more

Plex Media servers are being abused for DDoS attacks | ZDNet

Published: 2021-02-06 03:48:29

Popularity: None

Author: Catalin Cimpanu

🤖: "Pwned again"

Cyber-security firm Netscout warns of new DDoS attack vector.

...more

New side-channel attack can recover encryption keys from Google Titan security keys | ZDNet

Published: 2021-01-08 12:05:45

Popularity: None

Author: Catalin Cimpanu

🤖: "Key leak"

Attack requires physical access to the devices but Titan and other keys can be cloned if attacks are successful.

...more

Critical privilege escalation bugs squashed in WordPress Ultimate Member plugin | ZDNet

Published: 2020-11-11 03:59:46

Popularity: None

Author: Charlie Osborne

🤖: "Bugged membership"

The vulnerabilities impacted roughly 100,000 websites.

...more

Google warns of severe 'BleedingTooth' Bluetooth flaw in Linux kernel | ZDNet

Published: 2020-10-15 12:24:07

Popularity: None

Author: Liam Tung

🤖: "Tooth decay"

Intel recommends updating to Linux kernel 5.9 to mitigate a serious flaw Google found in the Linux Bluetooth stack.

...more

Hacker breaches security firm in act of revenge | ZDNet

Published: 2020-07-14 02:05:54

Popularity: None

Author: Catalin Cimpanu

🤖: "Hacked Back"

Hacker claims to have stolen more than 8,200 databases from a security firm's data leak monitoring service.

...more

Apple strong-arms entire CA industry into one-year certificate lifespans | ZDNet

Published: 2020-06-30 12:09:07

Popularity: None

Author: Catalin Cimpanu

🤖: "Certificate Armageddon"

Apple, Google, and Mozilla reduce the lifespan for HTTPS certificates to 398 days, against the wishes of Certificate Authorities.

...more

Hacker leaks database of dark web hosting provider | ZDNet

Published: 2020-06-01 05:11:44

Popularity: None

Author: Catalin Cimpanu

🤖: ""Dark Web Hack""

Leaked data contains email addresses, site admin passwords, and .onion domain private keys.

...more

Fortune 500 company NTT discloses security breach | ZDNet

Published: 2020-05-29 20:29:56

Popularity: None

Author: Catalin Cimpanu

🤖: "Security blowup"

Japanese telecommunications giant NTT says hackers breached its internal network and stole data on 621 customers.

...more

New fuzzing tool finds 26 USB bugs in Linux, Windows, macOS, and FreeBSD | ZDNet

Published: 2020-05-28 12:49:43

Popularity: None

Author: Catalin Cimpanu

🤖: "bug hunt fail"

Eighteen of the 26 bugs impact Linux. Eleven have been patched already.

...more

Samsung patches 0-click vulnerability impacting all smartphones sold since 2014 | ZDNet

Published: 2020-05-08 02:13:35

Popularity: None

Author: Catalin Cimpanu

🤖: ""Zero-day exploited""

Samsung patched this month a critical bug discovered by Google security researchers.

...more

Hackers breach LineageOS servers via unpatched vulnerability | ZDNet

Published: 2020-05-03 11:35:16

Popularity: None

Author: Catalin Cimpanu

🤖: "Hacked!"

LineageOS source code, OS builds, and signing keys were unaffected, developers said.

...more

Hacker hijacks YouTube accounts to broadcast Bill Gates-themed crypto Ponzi scam | ZDNet

Published: 2020-03-31 13:27:46

Popularity: None

Author: Catalin Cimpanu

🤖: "Hacker hijacked"

UPDATE: Microsoft says none of its verified accounts were hacked. YouTube has also intervened to take down the scam's live streams.

...more

Dark web hosting provider hacked again -- 7,600 sites down | ZDNet

Published: 2020-03-27 13:02:08

Popularity: None

Author: Catalin Cimpanu

🤖: ""Server Down""

EXCLUSIVE: Dark web hosting provider shuts down after getting hacked for the second time in 16 months.

...more

Hackers breach FSB contractor and leak details about IoT hacking project | ZDNet

Published: 2020-03-21 15:15:09

Popularity: None

Author: Catalin Cimpanu

🤖: "Hacked again"

Digital Revolution hacker group leaks details about "Fronton" an IoT botnet a contractor was allegedly building for the FSB, Russia's intelligence agency.

...more

AMD processors from 2011 to 2019 vulnerable to two new attacks | ZDNet

Published: 2020-03-08 03:09:02

Popularity: None

Author: Catalin Cimpanu

🤖: ""processor fail""

Academics disclose new Collide+Probe and Load+Reload attacks on AMD CPUs.

...more

Ghostcat bug impacts all Apache Tomcat versions released in the last 13 years | ZDNet

Published: 2020-03-03 17:05:48

Popularity: None

Author: Catalin Cimpanu

🤖: "Apache melt down"

Ghostcat vulnerability can allow hackers to read configuration files or plant backdoors on Tomcat servers.

...more

New Kr00k vulnerability lets attackers decrypt WiFi packets | ZDNet

Published: 2020-02-26 16:07:40

Popularity: None

Author: Catalin Cimpanu

🤖: ""Your wifi's on fire""

Kr00k affects devices using Broadcom and Cypress Wi-Fi chips.

...more

LTE security flaw can be abused to take out subscriptions at your expense | ZDNet

Published: 2020-02-24 18:06:09

Popularity: None

Author: Charlie Osborne

🤖: "Subscription trap"

Researchers say the vulnerability impacts “virtually all” smartphones on the market.

...more

OpenSSH adds support for FIDO/U2F security keys | ZDNet

Published: 2020-02-16 00:58:01

Popularity: None

Author: Catalin Cimpanu

🤖: "Secure login"

OpenSSH 8.2 adds support for authentication via FIDO/U2F protocols, most commonly used with hardware security keys.

...more

Bluetooth LE devices impacted by SweynTooth vulnerabilities | ZDNet

Published: 2020-02-15 17:59:43

Popularity: None

Author: Catalin Cimpanu

🤖: "Hack alert"

BLE software kits from six chipset vendors impacted. More vendor names to be revealed soon.

...more

This Trojan hijacks your smartphone to send offensive text messages | ZDNet

Published: 2020-01-15 14:08:36

Popularity: None

Author: Charlie Osborne

🤖: ""Text Bomb""

The feature is certainly one way to advertise a malware infection.

...more

Chinese hacker group caught bypassing 2FA | ZDNet

Published: 2019-12-23 14:13:03

Popularity: None

Author: Catalin Cimpanu

Chinese state-sponsored group APT20 has been busy hacking government entities and managed service providers.

...more

HackerOne awards $20,000 bug bounty for private data access vulnerability on its own platform | ZDNet

Published: 2019-12-05 20:09:36

Popularity: None

Author: Charlie Osborne

🤖: ""bug caught""

An analyst and a cut-and-paste job resulted in a critical security problem.

...more

Android: New StrandHogg vulnerability is being exploited in the wild | ZDNet

Published: 2019-12-02 20:47:16

Popularity: None

Author: Catalin Cimpanu

🤖: ""Zero Day Exploit""

Promon discovers new StrandHogg vulnerability. Lookout identifies 36 malicious apps exploiting it in the wild.

...more

Vulnerability found and fixed in HP bloatware | ZDNet

Published: 2019-10-12 14:15:47

Popularity: None

Author: Catalin Cimpanu

🤖: "Bloatware bites back"

HP releases security update for HP Touchpoint Analytics app. Device owners advised to update.

...more

Metasploit team releases BlueKeep exploit | ZDNet

Published: 2019-09-06 19:06:45

Popularity: None

Author: Catalin Cimpanu

🤖: "Exploit alert"

Metasploit BlueKeep module can achieve code execution, is easy to use.

...more

US company selling weaponized BlueKeep exploit | ZDNet

Published: 2019-07-25 13:41:38

Popularity: None

Author: Catalin Cimpanu

🤖: ""Exploit for sale""

An exploit for a vulnerability that Microsoft feared it may trigger the next WannaCry is now being sold commercially.

...more

Hackers breach FSB contractor, expose Tor deanonymization project and more | ZDNet

Published: 2019-07-20 18:22:06

Popularity: None

Author: Catalin Cimpanu

🤖: ""Tor hacked""

SyTech, the hacked company, was working on research projects for the FSB, Russia's intelligence service.

...more

Logitech wireless USB dongles vulnerable to new hijacking flaws | ZDNet

Published: 2019-07-09 15:21:05

Popularity: None

Author: Catalin Cimpanu

🤖: ""USB Hijacked""

Vulnerabilities found in Logitech's proprietary Unifying USB dongle technology.

...more

Seriously? Cisco put Huawei X.509 certificates and keys into its own switches | ZDNet

Published: 2019-07-05 12:40:04

Popularity: None

Author: Liam Tung

How did cryptographic certificates and keys issued to Huawei end up in Cisco gear?

...more

YouTube policy on removing ‘instructional hacking’ content causes infosec community outrage | ZDNet

Published: 2019-07-04 15:50:16

Popularity: None

Author: Charlie Osborne

Videos removed from a prominent educational channel brought the policy to light. Supporters fought back.

...more

First-ever malware strain spotted abusing new DoH (DNS over HTTPS) protocol | ZDNet

Published: 2019-07-04 10:38:00

Popularity: None

Author: Catalin Cimpanu

Godlua, a Linux DDoS bot, is the first-ever malware strain seen using DoH to hide its DNS traffic.

...more

New Silex malware is bricking IoT devices, has scary plans | ZDNet

Published: 2019-06-26 14:22:09

Popularity: None

Author: Catalin Cimpanu

Over 2,000 devices have been bricked in the span of a few hours. Attacks still ongoing.

...more

Windows 10 zero-day exploit code released online | ZDNet

Published: 2019-05-22 06:24:03

Popularity: None

Author: Catalin Cimpanu

Security researcher 'SandboxEscaper' returns with new Windows LPE zero-day.

...more

A hacker is wiping Git repositories and asking for a ransom | ZDNet

Published: 2019-05-04 13:57:51

Popularity: None

Author: Catalin Cimpanu

Hacker threatens to release the code if victims don't pay in 10 days.

...more

5G depends on Kubernetes in the cloud | ZDNet

Published: 2019-05-03 01:12:32

Popularity: None

Author: Steven J. Vaughan-Nichols

If we're to ever have 5G in the real world, it's going to be running on Kubernetes.

...more

Trojanized version of PuTTY client discovered online | ZDNet

Published: 2019-03-08 00:21:18

Popularity: None

Author: Charlie Osborne

🤖: "backdoor found"

A version of the client has been tampered to steal user data.

...more

CISA data-sharing bill passes Senate with no privacy protections | ZDNet

Published: 2019-03-08 00:08:12

Popularity: None

Author: Zack Whittaker

🤖: ""Surveillance mode""

There was unanimous opposition to the bill across the tech industry.

...more

Linux 4.6 is a major release: Here's what's new and improved | ZDNet

Published: 2019-03-07 23:52:07

Popularity: None

Author: Steven J. Vaughan-Nichols

With better security, improved ARM support, and, oh yes, better gaming hardware support, Linux 4.6 is a major update.

...more

Zero-day Skype flaw causes crashes, remote code execution | ZDNet

Published: 2019-03-07 22:59:38

Popularity: None

Author: Charlie Osborne

The critical flaw doesn't require any user interaction, either.

...more

Windows, Linux distros, macOS pay for Kerberos 21-year-old 'cryptographic sin' | ZDNet

Published: 2019-03-07 22:58:24

Popularity: None

Author: Liam Tung

Researchers find an authentication protocol bug that affects Windows, Linux and Apple.

...more

Writing Windows or Linux apps? Microsoft just launched a cloud-powered bug hunter to find the flaws in your code | ZDNet

Published: 2019-03-07 22:57:14

Popularity: None

Author: Liam Tung

Microsoft's enterprise customers can soon use its Azure-hosted fuzzing service to ferret out bugs in their own Windows and Linux applications.

...more

DJI launches bug bounty program to stop homegrown hacking | ZDNet

Published: 2019-03-07 22:52:13

Popularity: None

Author: Charlie Osborne

The arms race has gained pace with DJI offering cash rewards for vulnerability reports.

...more

First Linux 4.14 release adds "very core" features, arrives in time for kernel's 26th birthday | ZDNet

Published: 2019-03-07 22:51:13

Popularity: None

Author: Liam Tung

Linus Torvalds says Linux 4.14 is getting core new functionality.

...more

Apple's macOS High Sierra will launch with a major security hole

Published: 2019-03-07 22:49:54

Popularity: None

Author: Zack Whittaker

The vulnerability lets an attacker steal the contents of a Keychain — without needing a password.

...more

Yubico launches YubiHSM 2: The smallest, cheapest Hardware Security Module (HSM) | ZDNet

Published: 2019-03-07 22:44:50

Popularity: None

Author: Adrian Kingsley-Hughes

The YubiHSM 2 is the world's smallest and cost-effective hardware security module, allowing for a root of trust for all servers, IoT gateways, and computing devices.

...more

Yubico launches YubiHSM 2: The smallest, cheapest Hardware Security Module (HSM) | ZDNet

Published: 2019-03-07 22:44:48

Popularity: None

Author: Adrian Kingsley-Hughes

The YubiHSM 2 is the world's smallest and cost-effective hardware security module, allowing for a root of trust for all servers, IoT gateways, and computing devices.

...more

Just one day after its release, iOS 11.1 hacked by security researchers

Published: 2019-03-07 22:44:26

Popularity: None

Author: Zack Whittaker

The bugs were found in Apple's Safari web browser.

...more

Linux security: Google fuzzer finds ton of holes in kernel's USB subsystem | ZDNet

Published: 2019-03-07 22:43:54

Popularity: None

Author: Liam Tung

A Google-developed kernel fuzzer has helped locate dozens of Linux security flaws.

...more

Imgur confirms it was hacked

Published: 2019-03-07 22:40:35

Popularity: None

Author: Zack Whittaker

The hackers stole email addresses and passwords.

...more

Chrome 63 vs Windows 10 Edge: Google steps up rivalry with site isolation security | ZDNet

Published: 2019-03-07 22:37:17

Popularity: None

Author: Liam Tung

Google says its new Chrome 63 brings a major enterprise security boost.

...more

Linux Meltdown patch: 'Up to 800 percent CPU overhead', Netflix tests show | ZDNet

Published: 2019-03-07 22:31:57

Popularity: None

Author: Liam Tung

The performance impact of Meltdown patches makes it essential to move systems to Linux 4.14.

...more

SAML protocol bug let hackers log in as other users

Published: 2019-03-07 22:29:45

Popularity: None

Author: Zack Whittaker

A validation bug in how some single sign-on products implemented an open authentication standard could have allowed an attacker to log in to a site or service as though they were the victim they were targeting.

...more

New LTE attacks can eavesdrop on text messages and spoof emergency alerts

Published: 2019-03-07 22:29:37

Popularity: None

Author: Zack Whittaker

One of the ten attacks can create "artificial chaos" by sending fake emergency alerts to a large number of devices.

...more

Snooping on HTTPS is about to get harder: TLS 1.3 internet encryption wins approval | ZDNet

Published: 2019-03-07 22:27:39

Popularity: None

Author: Liam Tung

The latest version of the protocol for HTTPS secure connections gets green light from the IETF.

...more

AWS traffic hijack: Users sent to phishing site in two-hour cryptocurrency heist | ZDNet

Published: 2019-03-07 22:24:11

Popularity: None

Author: Liam Tung

Criminals pull off a brazen attack using weakness in core internet infrastructure.

...more

AWS traffic hijack: Users sent to phishing site in two-hour cryptocurrency heist | ZDNet

Published: 2019-03-07 22:24:08

Popularity: None

Author: Liam Tung

Criminals pull off a brazen attack using weakness in core internet infrastructure.

...more

Windows security: Microsoft issues fix for critical Docker tool flaw, so patch now | ZDNet

Published: 2019-03-07 22:23:22

Popularity: None

Author: Liam Tung

Microsoft has patched a bug in an open-source tool it developed to help Docker containers run on Windows.

...more

​Linux comes to Chromebooks | ZDNet

Published: 2019-03-07 22:22:50

Popularity: None

Author: Steven J. Vaughan-Nichols

Chrome OS is based on Linux, but you can't easily run Linux applications on it. That's about to change, with Google's Project Crostini rolling out.

...more

Over a dozen vulnerabilities uncovered in BMW vehicles | ZDNet

Published: 2019-03-07 22:21:24

Popularity: None

Author: Charlie Osborne

Tencent's Keen Security Lab found a number of serious bugs which could be exploited by attackers to remotely attack a number of BMW models.

...more

Google patches reCAPTCHA bypass vulnerability | ZDNet

Published: 2019-03-07 22:20:10

Popularity: None

Author: Charlie Osborne

The security flaw allowed attackers to circumvent the reCAPTCHA bot protection system.

...more

​GitLab moves from Azure to Google Cloud Platform | ZDNet

Published: 2019-03-07 22:18:11

Popularity: None

Author: Steven J. Vaughan-Nichols

Microsoft may own GitHub soon, but GitLab is moving further away from Microsoft.

...more

German police raid homes of Tor-linked group's board members | ZDNet

Published: 2019-03-07 22:17:09

Popularity: None

Author: Yael Grauer

One board member described the police's justification for the raids as a "tenuous" link between the privacy group, a blog, and its email address.

...more

​Python language founder steps down | ZDNet

Published: 2019-03-07 22:16:40

Popularity: None

Author: Steven J. Vaughan-Nichols

Guido van Rossum, the "Benevolent Dictator For Life" of Python, has had enough and is walking away from leading the popular open-source language.

...more

Thousands of Mega logins dumped online, exposing user files | ZDNet

Published: 2019-03-07 22:16:20

Popularity: None

Author: Zack Whittaker

Exclusive: Email addresses, passwords, and lists of file names were exposed.

...more

Severe vulnerability exposes WordPress websites to attack | ZDNet

Published: 2019-03-07 22:13:46

Popularity: None

Author: Charlie Osborne

Researchers say the PHP security flaw could leave countless WordPress websites open to exploit.

...more

Microsoft Windows zero-day vulnerability disclosed through Twitter | ZDNet

Published: 2019-03-07 22:12:04

Popularity: None

Author: Charlie Osborne

Updated: There is no known workaround for the security flaw.

...more

Five Eyes governments get even tougher on encryption | ZDNet

Published: 2019-03-07 22:11:38

Popularity: None

Author: Stilgherrian

Official statements from the Five Country Ministerial meeting make it clear: Voluntarily build lawful access into encrypted messaging systems, or else. It's not a good look.

...more

Vulnerabilities found in the remote management interface of Supermicro servers | ZDNet

Published: 2019-03-07 22:11:30

Popularity: None

Author: Catalin Cimpanu

Eclypsium researchers disclose second vulnerability affecting Supermicro servers in the past three months

...more

Zero-day in popular jQuery plugin actively exploited for at least three years | ZDNet

Published: 2019-03-07 22:07:31

Popularity: None

Author: Catalin Cimpanu

A fix is out but the plugin is used in hundreds, if not thousands, of projects. Patching will take ages!

...more

Twelve malicious Python libraries found and removed from PyPI | ZDNet

Published: 2019-03-07 22:06:57

Popularity: None

Author: Catalin Cimpanu

One package contained a clipboard hijacker that replaced victims' Bitcoin addresses in an attempt to hijack funds from users.

...more

Researchers discover seven new Meltdown and Spectre attacks | ZDNet

Published: 2019-03-07 22:05:02

Popularity: None

Author: Catalin Cimpanu

Experiments showed that processors from AMD, ARM, and Intel are affected.

...more

AWS rolls out new security feature to prevent accidental S3 data leaks | ZDNet

Published: 2019-03-07 22:04:55

Popularity: None

Author: Catalin Cimpanu

New settings will prevent accidental S3 bucket leaks --if customers take the time to apply them.

...more

Popular Dark Web hosting provider got hacked, 6,500 sites down | ZDNet

Published: 2019-03-07 22:04:47

Popularity: None

Author: Catalin Cimpanu

Hosting provider is still looking for the hacker's point of entry.

...more

Two Android apps used in combat by US troops contained severe vulnerabilities | ZDNet

Published: 2019-03-07 22:02:49

Popularity: None

Author: Catalin Cimpanu

Apps were meant for training, never approved for combat. Whistleblower's efforts helped shed light on vulnerabilities, despite leadership reprisals.

...more

Hackers dump data of hundreds of German politicians on Twitter | ZDNet

Published: 2019-03-07 22:01:14

Popularity: None

Author: Catalin Cimpanu

Data for some German artists and YouTube celebrities also included.

...more

Adobe fixes vulnerabilities in Connect and Digital Editions, Flash left in the cold | ZDNet

Published: 2019-03-07 22:00:20

Popularity: None

Author: Charlie Osborne

Patches were released for Flash but they did not contain fixes for security issues.

...more

Mozilla: Firefox 69 will disable Adobe Flash plugin by default | ZDNet

Published: 2019-03-07 21:59:41

Popularity: None

Author: Liam Tung

Browser makers this year will be disabling Flash with its long history of security problems.

...more

Metasploit, popular hacking and security tool, gets long-awaited update | ZDNet

Published: 2019-03-07 21:59:33

Popularity: None

Author: Steven J. Vaughan-Nichols

After seven years, Metasploit Framework, the popular open-source hacking and security tool, has been given a major update.

...more

Popular WordPress plugin hacked by angry former employee | ZDNet

Published: 2019-03-07 21:59:12

Popularity: None

Author: Catalin Cimpanu

Hacker defaced the company's website and sent a mass email to all its customers, alleging unpatched security holes.

...more

This Trojan infects Chrome browser extensions, spoofs searches to steal cryptocurrency | ZDNet

Published: 2019-03-07 21:58:51

Popularity: None

Author: Charlie Osborne

The malware also takes over browser update and integrity checks.

...more

Microsoft: 70 percent of all security bugs are memory safety issues | ZDNet

Published: 2019-03-07 21:57:42

Popularity: None

Author: Catalin Cimpanu

Percentage of memory safety issues has been hovering at 70 percent for the past 12 years.

...more

Russia to disconnect from the internet as part of a planned test | ZDNet

Published: 2019-03-07 21:57:35

Popularity: None

Author: Catalin Cimpanu

Russia's internet contingency plan gets closer to reality.

...more

Adobe sends out second fix for critical Reader data leak vulnerability | ZDNet

Published: 2019-03-07 21:57:12

Popularity: None

Author: Charlie Osborne

The original patch issued for the zero-day can be bypassed.

...more

end