Dan Goodin - Page 1

98 Posts
0 Comments

I’m a security reporter and got fooled by a blatant phish

Enlarge / This is definitely not a Razer mouse—but you get the idea.calvio via Getty Images There has been a recent flurry...

Phishers who breached Twilio and fooled Cloudflare could easily get you, too

EnlargeGetty Images At least two security-sensitive companies—Twilio and Cloudflare—were targeted in a phishing attack by an advanced threat actor who had possession...

“Huge flaw” threatens US emergency alert system, DHS researcher warns

Enlarge / Obstruction light with bokeh city background The US Department of Homeland Security is warning of vulnerabilities in the nation’s emergency...

North Korea-backed hackers have a clever way to read your Gmail

EnlargeGetty Images Researchers have unearthed never-before-seen malware that hackers from North Korea have been using to surreptitiously read and download email and...

Newly found Lightning Framework offers a plethora of Linux hacking capabilities

EnlargeGetty Images The software framework has become essential to developing almost all complex software these days. The Django Web framework, for instance,...

Hackers are targeting industrial systems with malware

EnlargeGetty Images From the what-could-possibly-go-wrong files comes this: An industrial control engineer recently made a workstation part of a botnet after inadvertently...

Ongoing phishing campaign can hack you even when you’re protected with MFA

EnlargeGetty Images On Tuesday, Microsoft detailed an ongoing large-scale phishing campaign that can hijack user accounts when they're protected with multi-factor authentication...

Why Lockdown mode from Apple is one of the coolest security ideas ever

EnlargeApple Mercenary spyware is one of the hardest threats to combat. It targets an infinitesimally small percentage of the world, making it...

The cryptopocalypse is nigh! NIST rolls out new encryption standards to prepare

Enlarge / Conceptual computer artwork of electronic circuitry with blue and red light passing through it, representing how data may be controlled and stored...

Billing fraud apps can disable Android Wi-Fi and intercept text messages

EnlargeAurich Lawson Android malware developers are stepping up their billing fraud game with apps that disable Wi-Fi connections, surreptitiously subscribe users to...

Latest articles