Millions of web surfers are being targeted by a single malvertising group

reader comments 51 with 26 posters participating Share this story Hackers have compromised more than 120 ad servers over the past year in an ongoing campaign that displays malicious advertisements on tens of millions, if not hundreds of millions, of devices as they visit sites that, by all outward appearances, are benign. Malvertising is the […]

Dishy McFlatface to become “fully mobile,” allowing Starlink use away from home

Enlarge / A Starlink satellite dish in the Idaho panhandle’s Coeur d’Alene National Forest. reader comments 16 with 15 posters participating Share this story SpaceX CEO Elon Musk expects the Starlink satellite broadband service to be “fully mobile” later in 2021, allowing customers to use the satellite dishes away from home. “Yeah, should be fully […]

Backdoored developer tool that stole credentials escaped notice for 3 months

Enlarge (credit: Getty Images) A publicly available software development tool contained malicious code that stole the authentication credentials that apps need to access sensitive resources. It’s the latest revelation of a supply chain attack that has the potential to backdoor the networks of countless organizations. The Codecov bash uploader contained the backdoor from late January […]

US government strikes back at Kremlin for SolarWinds hack campaign

Enlarge (credit: Matt Anderson Photography/Getty Images) US officials on Thursday formally blamed Russia for backing one of the worst espionage hacks in recent US history and imposed sanctions designed to mete out punishments for that and other recent actions. In a joint advisory, the National Security Agency, FBI, and Cybersecurity and Information Security Agency said […]

100 million more IoT devices are exposed—and they won’t be the last

Enlarge (credit: Elena Lacey) Over the last few years, researchers have found a shocking number of vulnerabilities in seemingly basic code that underpins how devices communicate with the Internet. Now, a new set of nine such vulnerabilities are exposing an estimated 100 million devices worldwide, including an array of Internet-of-things products and IT management servers. […]

Microsoft acquires Nuance—makers of Dragon speech rec—for $16 billion

Enlarge / In this 2011 photo, Dr. Michael A. Lee uses Dragon Medical voice-recognition software to enter his notes after seeing a patient. (credit: David Ryan via Getty Images) Earlier today, Microsoft announced its plans to purchase Nuance for $56 per share—23 percent above Nuance’s closing price last Friday. The deal adds up to a […]

No password required: Mobile carrier exposes data for millions of accounts

Enlarge (credit: Getty Images) Q Link Wireless, a provider of low-cost mobile phone and data services to 2 million US-based customers, has been making sensitive account data available to anyone who knows a valid phone number on the carrier’s network, an analysis of the company’s account management app shows. Dania, Florida-based Q Link Wireless is […]

US adds Chinese supercomputing companies to export blacklist

Enlarge (credit: China News Service | Getty Images) The US has placed Chinese groups accused of building supercomputers to help the Chinese military on an export blacklist, the first such move by the Biden administration to make it harder for China to obtain US technology. Three companies and four branches of China’s National Supercomputing Center […]

Comcast nightmare: Six months without Internet despite $5,000 payment

Enlarge (credit: Aurich Lawson | Getty Images) When Edward Koll and his girlfriend, Jo Narkon, bought and moved into a new house in Draper, Virginia, in late September 2020, they had every reason to think that Comcast Internet would be readily available. They had done their due diligence before buying the house, plugging the address […]

Windows and Linux devices are under attack by a new cryptomining worm

Enlarge (credit: Getty Images) A newly discovered cryptomining worm is stepping up its targeting of Windows and Linux devices with a batch of new exploits and capabilities, a researcher said. Research company Juniper started monitoring what it’s calling the Sysrv botnet in December. One of the botnet’s malware components was a worm that spread from […]