Microsoft makes major course reversal, allows Office to run untrusted macros

Getty Images reader comments 41 with 36 posters participating Share this story Microsoft has stunned core parts of the security community with a decision to quietly reverse course and allow untrusted macros to be opened by default in Word and other Office applications. In February, the software maker announced a major change it said it […]

Starlink unveils $5,000-a-month Internet for oil rigs and premium yachts

Enlarge / Starlink Maritime puts dual terminals on large boats. reader comments 29 with 22 posters participating Share this story SpaceX yesterday announced a Starlink Maritime service that will bring satellite Internet service to large boats for $5,000 per month and an up-front hardware purchase of $10,000. “From merchant vessels to oil rigs to premium […]

End-to-end encryption’s central role in modern self-defense

reader comments 4 with 4 posters participating Share this story A number of course-altering US Supreme Court decisions last month—including the reversal of a constitutional right to abortion and the overturning of a century-old limit on certain firearms permits—have activists and average Americans around the country anticipating the fallout for rights and privacy as abortion […]

Why Lockdown mode from Apple is one of the coolest security ideas ever

reader comments 66 with 45 posters participating Share this story Mercenary spyware is one of the hardest threats to combat. It targets an infinitesimally small percentage of the world, making it statistically unlikely for most of us to ever see. And yet, because the sophisticated malware only selects the most influential individuals (think diplomats, political […]

The cryptopocalypse is nigh! NIST rolls out new encryption standards to prepare

Enlarge / Conceptual computer artwork of electronic circuitry with blue and red light passing through it, representing how data may be controlled and stored in a quantum computer. Getty Images reader comments 32 with 28 posters participating Share this story In the not-too-distant future—as little as a decade, perhaps, nobody knows exactly how long—the cryptography […]

Google allowed sanctioned Russian ad company to harvest user data for months

reader comments 30 with 24 posters participating Share this story ProPublica is a Pulitzer Prize-winning investigative newsroom. Sign up for The Big Story newsletter to receive stories like this one in your inbox. The day after Russia’s February invasion of Ukraine, Senate Intelligence Committee Chairman Mark Warner sent a letter to Google warning it to […]

Google closes data loophole amid privacy fears over abortion ruling

reader comments 35 with 28 posters participating Share this story Google is closing a loophole that has allowed thousands of companies to monitor and sell sensitive personal data from Android smartphones, an effort welcomed by privacy campaigners in the wake of the US Supreme Court’s decision to end women’s constitutional right to abortion. It also […]

Billing fraud apps can disable Android Wi-Fi and intercept text messages

reader comments 13 with 12 posters participating Share this story Android malware developers are stepping up their billing fraud game with apps that disable Wi-Fi connections, surreptitiously subscribe users to pricey wireless services, and intercept text messages, all in a bid to collect hefty fees from unsuspecting users, Microsoft said on Friday. This threat class […]

Microsoft Exchange servers worldwide hit by stealthy new backdoor

Enlarge (credit: Getty Images) Researchers have identified stealthy new malware that threat actors have been using for the past 15 months to backdoor Microsoft Exchange servers after they have been hacked. Dubbed SessionManager, the malicious software poses as a legitimate module for Internet Information Services (IIS), the web server installed by default on Exchange servers. […]