Movatterモバイル変換


[0]ホーム

URL:


Skip to content
Forum
Subscribe

Security

Finger touching digital screen of a CO2 monitor to measure indoor air quality and carbon dioxide concentration. Composite image between a hand photography and a 3D background.

This hacker conference installed a literal antivirus monitoring system

Organizers had a way for attendees to track CO2 levels throughout the venue—even before they arrived.

WIRED| 103
Stylized illustration of key.

Oops. Cryptographers cancel election results after losing decryption key.

Voting system required three keys. One of them has been “irretrievably lost.”

Dan Goodin| 180
Ethernet ports on an Asus router.

How to know if your Asus router is one of thousands hacked by China-state hackers

So far, the hackers are laying low, likely for later use.

Dan Goodin| 95

Critics scoff after Microsoft warns AI feature can infect machines and pilfer data

Integration of Copilot Actions into Windows is off by default, but for how long?

Dan Goodin| 69
purple bitcoin symbol with data chips

Bonkers Bitcoin heist: 5-star hotels, cash-filled envelopes, vanishing funds

Bitcoin mining hardware exec falls for sophisticated crypto scam to tune of $200k

WIRED| 75

5 plead guilty to laptop farm and ID theft scheme to land North Koreans US IT jobs

Fleets of laptops run from US residences gave appearance workers were in the US.

Dan Goodin| 43
An "AI" balloon floating close to a sharp, upturned push pin.

Researchers question Anthropic claim that AI-assisted attack was 90% autonomous

The results of AI-assisted hacking aren’t as impressive as many might have us believe.

Dan Goodin| 83
A stylized skull and crossbones made out of ones and zeroes.

ClickFix may be the biggest security threat your family has never heard of

Relatively new technique can bypass many endpoint protections.

Dan Goodin| 180
Samsung Galaxy Z Fold 7 hinge macro

Commercial spyware “Landfall” ran rampant on Samsung phones for almost a year

Targeted attack could steal all of a phone’s data and activate camera or mic.

Ryan Whitwam| 68

How to trade your $214,000 cybersecurity job for a jail cell

Ransomware doesn’t pay what it used to.

Nate Anderson| 68

Wipers from Russia’s most cut-throat hackers rain destruction on Ukraine

Sandworm and other Russian-state hackers unleash data-destroying payloads on their neighbors.

Dan Goodin| 42

Musk and Trump both went to Penn—now hacked by someone sympathetic to their cause

Social engineering strikes again.

Nate Anderson| 222

5 AI-developed malware families analyzed by Google fail to work and are easily detected

You wouldn’t know it from the hype, but the results fail to impress.

Dan Goodin| 31

Two Windows vulnerabilities, one a 0-day, are under active exploitation

Both vulnerabilities are being exploited in wide-scale operations.

Dan Goodin| 86
Illustration of a padlock on a circuit board

FCC to rescind ruling that said ISPs are required to secure their networks

FCC chair to rely on ISPs’ voluntary commitments instead of Biden-era ruling.

Jon Brodkin| 83

NPM flooded with malicious packages downloaded more than 86,000 times

Packages downloaded from NPM can fetch dependencies from untrusted sites.

Dan Goodin| 64

New physical attacks are quickly diluting secure enclave defenses from Nvidia, AMD, and Intel

On-chip TEEs withstand rooted OSes but fall instantly to cheap physical attacks.

Dan Goodin| 87
Screenshot of Universe Browser landing page

This browser claims “perfect privacies protection,” but it acts like malware

Researchers note links to Asia’s booming cybercrime and illegal gambling networks.

WIRED| 38

Cache poisoning vulnerabilities found in 2 DNS resolving apps

At least one CVE could weaken defenses put in place following 2008 disclosure.

Dan Goodin| 38
A Land Rover on a production line

Jaguar Land Rover looking at $2.5 billion price tag from crippling cyberattack

Incident was likely the most economically damaging cyber event in UK history.

Financial Times| 90

NSO permanently barred from targeting WhatsApp users with Pegasus spyware

Ruling holds that defeating end-to-end encryption in WhatsApp harms Meta’s business.

Dan Goodin| 108

Nation-state hackers deliver malware from “bulletproof” blockchains

Malicious payloads stored on Ethereum and BNB blockchains are immune to takedowns.

Dan Goodin| 107
corporate building with windows and red F5 logo

Thousands of customers imperiled after nation-state ransacks F5’s network

Risks to BIG-IP users include supply-chain attacks, credential loss, and vulnerability exploits.

Dan Goodin| 101
A French Navy vessel watches the surfaced Russian sub Novorossiysk this week.

NATO boss mocks Russian navy, which is on the hunt forRed October “the nearest mechanic”

A Russian sub surfaces off of Western Europe. Is it damaged?

Nate Anderson| 296

Hackers can steal 2FA codes and private messages from Android phones

Malicious app required to make “Pixnapping” attack work requires no permissions.

Dan Goodin| 128

Why Signal’s post-quantum makeover is an amazing engineering achievement

New design sets a high standard for post-quantum readiness.

Dan Goodin| 163

Apple ups the reward for finding major exploits to $2 million

With bonuses, maximum rewards can be as high as $5 million.

WIRED| 46

Microsoft warns of new “Payroll Pirate” scam stealing employees’ direct deposits

Among other things, the scammers bypass multi-factor authentication.

Dan Goodin| 53

Discord says hackers stole government IDs of 70,000 users

As more sites require IDs for user age verification, expect more such breaches to come.

Dan Goodin| 81
A ransom note is plastered across a laptop monitor.

Salesforce says it won’t pay extortion demand in 1 billion records breach

Scattered LAPSUS$ Hunters gave Salesforce until Friday to pay or else.

Dan Goodin| 60
A protestor holds a sign that says "ICE OUT!"

ICE wants to build a 24/7 social media surveillance team

ICE plans to hire contractors to scan platforms to target people for deportation.

WIRED| 322
Cans of Asahi Super Dry beer

Japan is running out of its favorite beer after ransomware attack

Asahi Super Dry production at Japanese breweries halted after cyberattack.

Financial Times| 109

That annoying SMS phish you just got may have come from a box like this

Smishers looking for new infrastructure are getting creative.

Dan Goodin| 54

Intel and AMD trusted enclaves, a foundation for network security, fall to physical attacks

The chipmakers say physical attacks aren’t in the threat model. Many users didn’t get the memo.

Dan Goodin| 67

Rocket Report: Keeping up with Kuiper; New Glenn’s second flight slips

Amazon plans to conduct two launches of Kuiper broadband satellites just days apart.

Stephen Clark| 131
Cisco Systems headquarters in San Jose, California, US, on Monday, Aug. 14, 2023.

As many as 2 million Cisco devices affected by actively exploited 0-day

Search shows 2 million vulnerable Cisco SNMP interfaces exposed to the Internet.

Dan Goodin| 32

[8]ページ先頭

©2009-2025 Movatter.jp