You are here
Home > Posts tagged "Ars Technica"

Hackers are exploiting a critical flaw affecting 350,000 WordPress sites

If you use this plugin, update now and scan your Wordpress installs for malware. I also recommend using a security plugin that blocks any IP that is scanning for wp-file-manager...: Hackers are actively exploiting a vulnerability that allows them to execute commands and malicious scripts on Websites running File Manager, a WordPress plugin with more than 700,000 active installations, researchers said on Tuesday. Word of the attacks came a few hours after the security fla...

“DeathStalker” hackers are (likely) older and more prolific than we thought

No, not COBOL-guys in their 60's (like me); this article is pointing out that the group might have been going for almost 10 years - a lifetime in internet years...: In 2018, researchers from security firm Kaspersky Lab began tracking “DeathStalker,” their name for a hacker-for-hire group that was employing simple but effective malware to do espionage on law firms and companies in the financial industry. Now, the researchers have linked the group to two other pieces of ma...

Police use of facial recognition violates human rights, UK court rules

Push back against the 'China-fication' of UK law enforcement...: Enlarge / A close-up of a police facial recognition camera in use at the Cardiff City Stadium on January 12, 2020 in Cardiff, Wales. Police used the technology to identify individuals who were issued with football banning orders in an attempt to prevent disorder. Critics argued that the use of such technology is invasive and discriminatory. (credit: Matthew Horwood | Getty Images) Privacy advocates in ...

Beware of find-my-phone, Wi-Fi, and Bluetooth, NSA tells mobile users

Like a lot of families, we have 'Find My iPhone' turned on so when the inevitable happens and someone leaves their device(s) on a bus/taxi/train we can all see where it is and wipe if irretrievable. Location Services come with risks though. Time to create your own threat model and decide if it's worth leaving them set to 'on'...: The National Security Agency is recommending that some government workers and people generally concerned about privacy turn off find-my-phone, ...

Cisco security breach hits corporate servers that ran unpatched software

And today's fire drill is...: [...] Cisco said that without updates any VIRL-PE or CML products that are deployed in standalone or cluster configurations will remain vulnerable to the same sorts of compromises. The company released software updates for the two vulnerable products. Cisco rated the severity of the vulnerabilities with a ranking of 10 out of 10 on the CVSS scale. The Salt vulnerabilities are a CVE-2020-11651, an authentication bypass, and CVE-2020-11652, a...

Here’s how Apple, Google will warn you if you’ve been exposed to COVID-19

Enlarge / Screenshot of contact-tracing smartphone app. (credit: Apple/Google) It may sound unsettling or even downright creepy for the device that’s generally with you 24/7 to make it possible for authorities to trace your exposure to a potentially fatal illness that’s currently consuming the world. That’s why Apple and Google have been bending over backward to provide privacy assurances about the platform-compatible programming interfaces they’re putting into iOS...

LockBit, the new ransomware for hire: a sad and cautionary tale

Understand how these malfeasants get into your network...: Ransomware has emerged as one of the top threats facing large organizations over the past few years, with researchers reporting a more than a fourfold increase in detections last year. A recent infection by a fairly new strain called LockBit explains why: after it ransacked one company’s poorly secured network in a matter of hours, leaders had no viable choice other than to pay the ransom. A report published by Mc

A critical iPhone and iPad bug that lurked for 8 years may be under active attack

Look out for a patch and make sure you apply it...: Enlarge (credit: ZecOps) A critical bug that has lurked in iPhones and iPads for eight years appears to be under active attack by sophisticated hackers to hack the devices of high-profile targets, a security firm reported on Wednesday. The exploit is triggered by sending booby-trapped emails that, in some cases, require no interaction at all and, in other cases, require only that a user open the message, researche...

Top