Safari and iOS users: Your browsing activity is being leaked in real time

Getty Images reader comments 31 with 27 posters participating Share this story For the past four months, Apple’s iOS and iPadOS devices and Safari browser have violated one of the Internet’s most sacrosanct security policies. The violation results from a bug that leaks user identities and browsing activity in real time. The same-origin policy is […]

Microsoft warns of destructive disk wiper targeting Ukraine

Getty Images reader comments 39 with 23 posters participating Share this story Over the past few months, geopolitical tensions have escalated as Russia amassed tens of thousands of troops along Ukraine’s border and made subtle but far-reaching threats if Ukraine and NATO don’t agree to Kremlin demands. Now, a similar dispute is playing out in […]

Backdoor for Windows, macOS, and Linux went undetected until now

reader comments 20 with 15 posters participating Share this story Researchers have uncovered a never-before-seen backdoor written from scratch for systems running Windows, macOS, or Linux that remained undetected by virtually all malware scanning engines. Researchers from security firm Intezer said they discovered SysJoker—the name they gave the backdoor—on the Linux-based Webserver of a “leading […]

North Korean hackers stole nearly $400 million in crypto last year

reader comments 5 with 5 posters participating Share this story The past year saw a breathtaking rise in the value of cryptocurrencies like Bitcoin and Ethereum, with Bitcoin gaining 60 percent in value in 2021 and Ethereum spiking 80 percent. So perhaps it’s no surprise that the relentless North Korean hackers who feed off that […]

Russia says it has neutralized the cutthroat REvil ransomware gang

reader comments 43 with 34 posters participating Share this story Russian law enforcement authorities said on Friday that they have arrested 14 people associated with REvil, a top ransomware group that has disrupted critical operations of wealthy targets and held their data hostage. The action, carried out by Russia’s FSB, the successor agency to the […]

Ukraine says government websites hit by “massive cyber attack”

Enlarge / A Ukrainian Military Forces serviceman watches through a spyglass in a trench on the frontline with Russia-backed separatists near Avdiivka, southeastern Ukraine, on January 9, 2022. Anatolii Stepanov | Getty Images reader comments 53 with 30 posters participating Share this story Ukraine said it was the target of a “massive cyber attack” after […]

New Chrome security measure aims to curtail an entire class of Web attack

reader comments 25 with 20 posters participating Share this story For more than a decade, the Internet has remained vulnerable to a class of attacks that uses browsers as a beachhead for accessing routers and other sensitive devices on a targeted network. Now, Google is finally doing something about it. Starting in Chrome version 98, […]

Developer sabotages his own apps, then claims Aaron Swartz was murdered

reader comments 113 with 65 posters participating Share this story The developer who sabotaged two of his own open source code libraries, causing disruptions for thousands of apps that used them, has a colorful past that includes embracing a QAnon theory involving Aaron Swartz, the well-known hacktivist and programmer who died by suicide in 2013. […]

Patch systems vulnerable to critical Log4j flaws, UK and US officials warn

Getty Images reader comments 18 with 17 posters participating Share this story Criminals are actively exploiting the high-severity Log4Shell vulnerability on servers running VMware Horizon in an attempt to install malware that allows them to gain full control of affected systems, the UK’s publicly funded healthcare system is warning. CVE-2021-44228 is one of the most […]

5 months on, Apple has yet to fix iOS bug that sends devices into a crash spiral

Getty Images reader comments 29 with 23 posters participating Share this story Apple has been taking its time fixing an iOS bug that makes it easy for miscreants to completely disable an iOS device unless the victim performs a factory restore and follows other cumbersome steps, a researcher said. HomeKit is an Apple-designed communication protocol […]